Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0318
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-11-15T13:08:06.801Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { tags: [ "x_transferred", ], url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-32", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT213444", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6", tags: [ "mailing-list", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { name: "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { url: "https://security.netapp.com/advisory/ntap-20241115-0004/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "vim/vim", vendor: "vim", versions: [ { lessThan: "8.2", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-24T00:00:00", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { url: "https://support.apple.com/kb/HT213444", }, { url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6", tags: [ "mailing-list", ], url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { name: "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, ], source: { advisory: "0d10ba02-b138-4e68-a284-67f781a62d08", discovery: "EXTERNAL", }, title: "Heap-based Buffer Overflow in vim/vim", }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2022-0318", datePublished: "2022-01-21T00:00:00", dateReserved: "2022-01-20T00:00:00", dateUpdated: "2024-11-15T13:08:06.801Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-0318\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2022-01-21T12:15:10.053\",\"lastModified\":\"2024-11-21T06:38:22.010\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based Buffer Overflow in vim/vim prior to 8.2.\"},{\"lang\":\"es\",\"value\":\"Un Desbordamiento de Búfer en la región Heap de la Memoria en vim/vim versiones anteriores a 8.2\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.4151\",\"matchCriteriaId\":\"0F9F96CA-18A7-4C0B-8C3E-4A4DEC087ABA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/43\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213444\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/43\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241115-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/kb/HT213444\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
opensuse-su-2024:12337-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "gvim-9.0.0453-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12337", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12337-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0368 page", url: "https://www.suse.com/security/cve/CVE-2022-0368/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0408 page", url: "https://www.suse.com/security/cve/CVE-2022-0408/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0554 page", url: "https://www.suse.com/security/cve/CVE-2022-0554/", }, { category: "self", summary: "SUSE CVE CVE-2022-0572 page", url: "https://www.suse.com/security/cve/CVE-2022-0572/", }, { category: "self", summary: "SUSE CVE CVE-2022-0629 page", url: "https://www.suse.com/security/cve/CVE-2022-0629/", }, { category: "self", summary: "SUSE CVE CVE-2022-0685 page", url: "https://www.suse.com/security/cve/CVE-2022-0685/", }, { category: "self", summary: "SUSE CVE CVE-2022-0729 page", url: "https://www.suse.com/security/cve/CVE-2022-0729/", }, { category: "self", summary: "SUSE CVE CVE-2022-0943 page", url: "https://www.suse.com/security/cve/CVE-2022-0943/", }, { category: "self", summary: "SUSE CVE CVE-2022-1154 page", url: "https://www.suse.com/security/cve/CVE-2022-1154/", }, { category: "self", summary: "SUSE CVE CVE-2022-1160 page", url: "https://www.suse.com/security/cve/CVE-2022-1160/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1621 page", url: "https://www.suse.com/security/cve/CVE-2022-1621/", }, { category: "self", summary: "SUSE CVE CVE-2022-1629 page", url: "https://www.suse.com/security/cve/CVE-2022-1629/", }, { category: "self", summary: "SUSE CVE CVE-2022-1674 page", url: "https://www.suse.com/security/cve/CVE-2022-1674/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1769 page", url: "https://www.suse.com/security/cve/CVE-2022-1769/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1886 page", url: "https://www.suse.com/security/cve/CVE-2022-1886/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1942 page", url: "https://www.suse.com/security/cve/CVE-2022-1942/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2000 page", url: "https://www.suse.com/security/cve/CVE-2022-2000/", }, { category: "self", summary: "SUSE CVE CVE-2022-2042 page", url: "https://www.suse.com/security/cve/CVE-2022-2042/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2288 page", url: "https://www.suse.com/security/cve/CVE-2022-2288/", }, { category: "self", summary: "SUSE CVE CVE-2022-2289 page", url: "https://www.suse.com/security/cve/CVE-2022-2289/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, ], title: "gvim-9.0.0453-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12337-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.aarch64", product: { name: "gvim-9.0.0453-2.1.aarch64", product_id: "gvim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.aarch64", product: { name: "vim-9.0.0453-2.1.aarch64", product_id: "vim-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.aarch64", product: { name: "vim-data-9.0.0453-2.1.aarch64", product_id: "vim-data-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.aarch64", product: { name: "vim-data-common-9.0.0453-2.1.aarch64", product_id: "vim-data-common-9.0.0453-2.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.aarch64", product: { name: "vim-small-9.0.0453-2.1.aarch64", product_id: "vim-small-9.0.0453-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.ppc64le", product: { name: "gvim-9.0.0453-2.1.ppc64le", product_id: "gvim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.ppc64le", product: { name: "vim-9.0.0453-2.1.ppc64le", product_id: "vim-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.ppc64le", product: { name: "vim-data-9.0.0453-2.1.ppc64le", product_id: "vim-data-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.ppc64le", product: { name: "vim-data-common-9.0.0453-2.1.ppc64le", product_id: "vim-data-common-9.0.0453-2.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.ppc64le", product: { name: "vim-small-9.0.0453-2.1.ppc64le", product_id: "vim-small-9.0.0453-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.s390x", product: { name: "gvim-9.0.0453-2.1.s390x", product_id: "gvim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.s390x", product: { name: "vim-9.0.0453-2.1.s390x", product_id: "vim-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.s390x", product: { name: "vim-data-9.0.0453-2.1.s390x", product_id: "vim-data-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.s390x", product: { name: "vim-data-common-9.0.0453-2.1.s390x", product_id: "vim-data-common-9.0.0453-2.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.s390x", product: { name: "vim-small-9.0.0453-2.1.s390x", product_id: "vim-small-9.0.0453-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0453-2.1.x86_64", product: { name: "gvim-9.0.0453-2.1.x86_64", product_id: "gvim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0453-2.1.x86_64", product: { name: "vim-9.0.0453-2.1.x86_64", product_id: "vim-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-9.0.0453-2.1.x86_64", product: { name: "vim-data-9.0.0453-2.1.x86_64", product_id: "vim-data-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-data-common-9.0.0453-2.1.x86_64", product: { name: "vim-data-common-9.0.0453-2.1.x86_64", product_id: "vim-data-common-9.0.0453-2.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0453-2.1.x86_64", product: { name: "vim-small-9.0.0453-2.1.x86_64", product_id: "vim-small-9.0.0453-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", }, product_reference: "gvim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", }, product_reference: "gvim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", }, product_reference: "gvim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", }, product_reference: "gvim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", }, product_reference: "vim-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", }, product_reference: "vim-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", }, product_reference: "vim-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", }, product_reference: "vim-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", }, product_reference: "vim-data-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", }, product_reference: "vim-data-common-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", }, product_reference: "vim-data-common-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", }, product_reference: "vim-data-common-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", }, product_reference: "vim-data-common-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", }, product_reference: "vim-small-9.0.0453-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", }, product_reference: "vim-small-9.0.0453-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", }, product_reference: "vim-small-9.0.0453-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "vim-small-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", }, product_reference: "vim-small-9.0.0453-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0368", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0368", url: "https://www.suse.com/security/cve/CVE-2022-0368", }, { category: "external", summary: "SUSE Bug 1195205 for CVE-2022-0368", url: "https://bugzilla.suse.com/1195205", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0408", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0408", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0408", url: "https://www.suse.com/security/cve/CVE-2022-0408", }, { category: "external", summary: "SUSE Bug 1195459 for CVE-2022-0408", url: "https://bugzilla.suse.com/1195459", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0554", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0554", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0554", url: "https://www.suse.com/security/cve/CVE-2022-0554", }, { category: "external", summary: "SUSE Bug 1195846 for CVE-2022-0554", url: "https://bugzilla.suse.com/1195846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0572", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0572", url: "https://www.suse.com/security/cve/CVE-2022-0572", }, { category: "external", summary: "SUSE Bug 1196023 for CVE-2022-0572", url: "https://bugzilla.suse.com/1196023", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0629", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0629", url: "https://www.suse.com/security/cve/CVE-2022-0629", }, { category: "external", summary: "SUSE Bug 1196226 for CVE-2022-0629", url: "https://bugzilla.suse.com/1196226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0685", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0685", url: "https://www.suse.com/security/cve/CVE-2022-0685", }, { category: "external", summary: "SUSE Bug 1196227 for CVE-2022-0685", url: "https://bugzilla.suse.com/1196227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0685", }, { cve: "CVE-2022-0729", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0729", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0729", url: "https://www.suse.com/security/cve/CVE-2022-0729", }, { category: "external", summary: "SUSE Bug 1196437 for CVE-2022-0729", url: "https://bugzilla.suse.com/1196437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0943", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0943", url: "https://www.suse.com/security/cve/CVE-2022-0943", }, { category: "external", summary: "SUSE Bug 1197225 for CVE-2022-0943", url: "https://bugzilla.suse.com/1197225", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-0943", }, { cve: "CVE-2022-1154", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1154", }, ], notes: [ { category: "general", text: "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1154", url: "https://www.suse.com/security/cve/CVE-2022-1154", }, { category: "external", summary: "SUSE Bug 1197813 for CVE-2022-1154", url: "https://bugzilla.suse.com/1197813", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1154", }, { cve: "CVE-2022-1160", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1160", }, ], notes: [ { category: "general", text: "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1160", url: "https://www.suse.com/security/cve/CVE-2022-1160", }, { category: "external", summary: "SUSE Bug 1197814 for CVE-2022-1160", url: "https://bugzilla.suse.com/1197814", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1160", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1621", }, ], notes: [ { category: "general", text: "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1621", url: "https://www.suse.com/security/cve/CVE-2022-1621", }, { category: "external", summary: "SUSE Bug 1199435 for CVE-2022-1621", url: "https://bugzilla.suse.com/1199435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1621", }, { cve: "CVE-2022-1629", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1629", }, ], notes: [ { category: "general", text: "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1629", url: "https://www.suse.com/security/cve/CVE-2022-1629", }, { category: "external", summary: "SUSE Bug 1199436 for CVE-2022-1629", url: "https://bugzilla.suse.com/1199436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1674", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1674", url: "https://www.suse.com/security/cve/CVE-2022-1674", }, { category: "external", summary: "SUSE Bug 1199502 for CVE-2022-1674", url: "https://bugzilla.suse.com/1199502", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1769", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1769", url: "https://www.suse.com/security/cve/CVE-2022-1769", }, { category: "external", summary: "SUSE Bug 1199658 for CVE-2022-1769", url: "https://bugzilla.suse.com/1199658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1769", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1886", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1886", url: "https://www.suse.com/security/cve/CVE-2022-1886", }, { category: "external", summary: "SUSE Bug 1199969 for CVE-2022-1886", url: "https://bugzilla.suse.com/1199969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-1886", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1942", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1942", url: "https://www.suse.com/security/cve/CVE-2022-1942", }, { category: "external", summary: "SUSE Bug 1200125 for CVE-2022-1942", url: "https://bugzilla.suse.com/1200125", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2000", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2000", url: "https://www.suse.com/security/cve/CVE-2022-2000", }, { category: "external", summary: "SUSE Bug 1200405 for CVE-2022-2000", url: "https://bugzilla.suse.com/1200405", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2042", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2042", url: "https://www.suse.com/security/cve/CVE-2022-2042", }, { category: "external", summary: "SUSE Bug 1200471 for CVE-2022-2042", url: "https://bugzilla.suse.com/1200471", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2288", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2288", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2288", url: "https://www.suse.com/security/cve/CVE-2022-2288", }, { category: "external", summary: "SUSE Bug 1201137 for CVE-2022-2288", url: "https://bugzilla.suse.com/1201137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2288", }, { cve: "CVE-2022-2289", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2289", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2289", url: "https://www.suse.com/security/cve/CVE-2022-2289", }, { category: "external", summary: "SUSE Bug 1201139 for CVE-2022-2289", url: "https://bugzilla.suse.com/1201139", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2289", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x", "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-3153", }, ], }
opensuse-su-2022:0736-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).\n- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).\n- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).\n- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).\n- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).\n- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).\n- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).\n- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).\n- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).\n- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).\n- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-SLE-15.3-2022-736,openSUSE-SLE-15.4-2022-736", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0736-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2022:0736-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2022:0736-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-03-04T13:52:29Z", generator: { date: "2022-03-04T13:52:29Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2022:0736-1", initial_release_date: "2022-03-04T13:52:29Z", revision_history: [ { date: "2022-03-04T13:52:29Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.aarch64", product: { name: "gvim-8.0.1568-5.17.1.aarch64", product_id: "gvim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.aarch64", product: { name: "vim-8.0.1568-5.17.1.aarch64", product_id: "vim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.aarch64", product: { name: "vim-small-8.0.1568-5.17.1.aarch64", product_id: "vim-small-8.0.1568-5.17.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-data-8.0.1568-5.17.1.noarch", product: { name: "vim-data-8.0.1568-5.17.1.noarch", product_id: "vim-data-8.0.1568-5.17.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.0.1568-5.17.1.noarch", product: { name: "vim-data-common-8.0.1568-5.17.1.noarch", product_id: "vim-data-common-8.0.1568-5.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.ppc64le", product: { name: "gvim-8.0.1568-5.17.1.ppc64le", product_id: "gvim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.ppc64le", product: { name: "vim-8.0.1568-5.17.1.ppc64le", product_id: "vim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.ppc64le", product: { name: "vim-small-8.0.1568-5.17.1.ppc64le", product_id: "vim-small-8.0.1568-5.17.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.s390x", product: { name: "gvim-8.0.1568-5.17.1.s390x", product_id: "gvim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.s390x", product: { name: "vim-8.0.1568-5.17.1.s390x", product_id: "vim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.s390x", product: { name: "vim-small-8.0.1568-5.17.1.s390x", product_id: "vim-small-8.0.1568-5.17.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.x86_64", product: { name: "gvim-8.0.1568-5.17.1.x86_64", product_id: "gvim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.x86_64", product: { name: "vim-8.0.1568-5.17.1.x86_64", product_id: "vim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.x86_64", product: { name: "vim-small-8.0.1568-5.17.1.x86_64", product_id: "vim-small-8.0.1568-5.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-small-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-small-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", }, product_reference: "vim-small-8.0.1568-5.17.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-small-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64", "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x", "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:52:29Z", details: "important", }, ], title: "CVE-2022-0413", }, ], }
suse-su-2022:0736-2
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).\n- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).\n- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).\n- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).\n- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).\n- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).\n- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).\n- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).\n- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).\n- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).\n- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-736,SUSE-SUSE-MicroOS-5.2-2022-736", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0736-2.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0736-2", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220736-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0736-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-04-19T19:11:54Z", generator: { date: "2022-04-19T19:11:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0736-2", initial_release_date: "2022-04-19T19:11:54Z", revision_history: [ { date: "2022-04-19T19:11:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.aarch64", product: { name: "gvim-8.0.1568-5.17.1.aarch64", product_id: "gvim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.aarch64", product: { name: "vim-8.0.1568-5.17.1.aarch64", product_id: "vim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.aarch64", product: { name: "vim-small-8.0.1568-5.17.1.aarch64", product_id: "vim-small-8.0.1568-5.17.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.i586", product: { name: "gvim-8.0.1568-5.17.1.i586", product_id: "gvim-8.0.1568-5.17.1.i586", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.i586", product: { name: "vim-8.0.1568-5.17.1.i586", product_id: "vim-8.0.1568-5.17.1.i586", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.i586", product: { name: "vim-small-8.0.1568-5.17.1.i586", product_id: "vim-small-8.0.1568-5.17.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-8.0.1568-5.17.1.noarch", product: { name: "vim-data-8.0.1568-5.17.1.noarch", product_id: "vim-data-8.0.1568-5.17.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.0.1568-5.17.1.noarch", product: { name: "vim-data-common-8.0.1568-5.17.1.noarch", product_id: "vim-data-common-8.0.1568-5.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.ppc64le", product: { name: "gvim-8.0.1568-5.17.1.ppc64le", product_id: "gvim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.ppc64le", product: { name: "vim-8.0.1568-5.17.1.ppc64le", product_id: "vim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.ppc64le", product: { name: "vim-small-8.0.1568-5.17.1.ppc64le", product_id: "vim-small-8.0.1568-5.17.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.s390x", product: { name: "gvim-8.0.1568-5.17.1.s390x", product_id: "gvim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.s390x", product: { name: "vim-8.0.1568-5.17.1.s390x", product_id: "vim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.s390x", product: { name: "vim-small-8.0.1568-5.17.1.s390x", product_id: "vim-small-8.0.1568-5.17.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.x86_64", product: { name: "gvim-8.0.1568-5.17.1.x86_64", product_id: "gvim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.x86_64", product: { name: "vim-8.0.1568-5.17.1.x86_64", product_id: "vim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.x86_64", product: { name: "vim-small-8.0.1568-5.17.1.x86_64", product_id: "vim-small-8.0.1568-5.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-small-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", }, product_reference: "vim-small-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-small-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.0.1568-5.17.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-04-19T19:11:54Z", details: "important", }, ], title: "CVE-2022-0413", }, ], }
suse-su-2022:4619-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\nUpdated to version 9.0.0814:\n\n * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.\n * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.\n * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.\n * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c\n * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()\n * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c\n * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c\n * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c\n * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()\n * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.\n * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c\n * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free\n * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()\n * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321\n * Fixing bsc#1200884 Vim: Error on startup\n * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32\n * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37\n * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37\n * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()\n * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044\n * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045\n * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.\n * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue\n * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()\n * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()\n * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char\n * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()\n * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()\n * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()\n * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()\n * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()\n * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()\n * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow\n * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()\n * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()\n * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()\n * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()\n * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()\n * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()\n * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()\n * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand\n * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()\n * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()\n * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()\n * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()\n * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()\n * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()\n * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()\n * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()\n * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()\n * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c\n * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240\n * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval\n * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00\n * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow \n * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow \n * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use\n After Free \n * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()\n in src/ex_docmd.c \n * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to \n Out-of-bounds Read \n * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free\n * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow\n in vim prior to 8.2. \n * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in\n vim prior to 8.2. \n * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in\n init_ccline() in ex_getln.c \n * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in\n Conda vim prior to 8.2. \n * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow\n in skip_range \n * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in\n append_command \n * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in\n function cmdline_erase_chars \n * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in\n function vim_regexec_string \n * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in\n find_pattern_in_path \n * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim \n * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior\n to 8.2 \n * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior\n to 8.2 \n * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a\n .swp file to the editor's primary group, which allows local users to obtain\n sensitive information \n * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow\n in vim prior to 8.2 \n * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in\n vim prior to 8.2 \n * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset \n * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow \n * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in\n cindent.c \n * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior\n to 8.2. \n * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write \n * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read \n * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c\n * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c\n * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow\n * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c\n * Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read\n * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability \n exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. \n * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.\n * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()\n * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4619,SUSE-OpenStack-Cloud-9-2022-4619,SUSE-OpenStack-Cloud-Crowbar-9-2022-4619,SUSE-SLE-SAP-12-SP4-2022-4619,SUSE-SLE-SERVER-12-SP2-BCL-2022-4619,SUSE-SLE-SERVER-12-SP3-BCL-2022-4619,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619,SUSE-SLE-SERVER-12-SP5-2022-4619", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4619-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4619-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224619-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4619-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1173256", url: "https://bugzilla.suse.com/1173256", }, { category: "self", summary: "SUSE Bug 1174564", url: "https://bugzilla.suse.com/1174564", }, { category: "self", summary: "SUSE Bug 1176549", url: "https://bugzilla.suse.com/1176549", }, { category: "self", summary: "SUSE Bug 1182324", url: "https://bugzilla.suse.com/1182324", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE Bug 1200270", url: "https://bugzilla.suse.com/1200270", }, { category: "self", summary: "SUSE Bug 1200697", url: "https://bugzilla.suse.com/1200697", }, { category: "self", summary: "SUSE Bug 1200698", url: "https://bugzilla.suse.com/1200698", }, { category: "self", summary: "SUSE Bug 1200700", url: "https://bugzilla.suse.com/1200700", }, { category: "self", summary: "SUSE Bug 1200701", url: "https://bugzilla.suse.com/1200701", }, { category: "self", summary: "SUSE Bug 1200732", url: "https://bugzilla.suse.com/1200732", }, { category: "self", summary: "SUSE Bug 1200884", url: "https://bugzilla.suse.com/1200884", }, { category: "self", summary: "SUSE Bug 1200902", url: "https://bugzilla.suse.com/1200902", }, { category: "self", summary: "SUSE Bug 1200903", url: "https://bugzilla.suse.com/1200903", }, { category: "self", summary: "SUSE Bug 1200904", url: "https://bugzilla.suse.com/1200904", }, { category: "self", summary: "SUSE Bug 1201132", url: "https://bugzilla.suse.com/1201132", }, { category: "self", summary: "SUSE Bug 1201133", url: "https://bugzilla.suse.com/1201133", }, { category: "self", summary: "SUSE Bug 1201134", url: "https://bugzilla.suse.com/1201134", }, { category: "self", summary: "SUSE Bug 1201135", url: "https://bugzilla.suse.com/1201135", }, { category: "self", summary: "SUSE Bug 1201136", url: "https://bugzilla.suse.com/1201136", }, { category: "self", summary: "SUSE Bug 1201150", url: "https://bugzilla.suse.com/1201150", }, { category: "self", summary: "SUSE Bug 1201151", url: "https://bugzilla.suse.com/1201151", }, { category: "self", summary: "SUSE Bug 1201152", url: "https://bugzilla.suse.com/1201152", }, { category: "self", summary: "SUSE Bug 1201153", url: "https://bugzilla.suse.com/1201153", }, { category: "self", summary: "SUSE Bug 1201154", url: "https://bugzilla.suse.com/1201154", }, { category: "self", summary: "SUSE Bug 1201155", url: "https://bugzilla.suse.com/1201155", }, { category: "self", summary: "SUSE Bug 1201249", url: "https://bugzilla.suse.com/1201249", }, { category: "self", summary: "SUSE Bug 1201356", url: "https://bugzilla.suse.com/1201356", }, { category: "self", summary: "SUSE Bug 1201359", url: "https://bugzilla.suse.com/1201359", }, { category: "self", summary: "SUSE Bug 1201363", url: "https://bugzilla.suse.com/1201363", }, { category: "self", summary: "SUSE Bug 1201620", url: "https://bugzilla.suse.com/1201620", }, { category: "self", summary: "SUSE Bug 1201863", url: "https://bugzilla.suse.com/1201863", }, { category: "self", summary: "SUSE Bug 1202046", url: "https://bugzilla.suse.com/1202046", }, { category: "self", summary: "SUSE Bug 1202049", url: "https://bugzilla.suse.com/1202049", }, { category: "self", summary: "SUSE Bug 1202050", url: "https://bugzilla.suse.com/1202050", }, { category: "self", summary: "SUSE Bug 1202051", url: "https://bugzilla.suse.com/1202051", }, { category: "self", summary: "SUSE Bug 1202414", url: "https://bugzilla.suse.com/1202414", }, { category: "self", summary: "SUSE Bug 1202420", url: "https://bugzilla.suse.com/1202420", }, { category: "self", summary: "SUSE Bug 1202421", url: "https://bugzilla.suse.com/1202421", }, { category: "self", summary: "SUSE Bug 1202511", url: "https://bugzilla.suse.com/1202511", }, { category: "self", summary: "SUSE Bug 1202512", url: "https://bugzilla.suse.com/1202512", }, { category: "self", summary: "SUSE Bug 1202515", url: "https://bugzilla.suse.com/1202515", }, { category: "self", summary: "SUSE Bug 1202552", url: "https://bugzilla.suse.com/1202552", }, { category: "self", summary: "SUSE Bug 1202599", url: "https://bugzilla.suse.com/1202599", }, { category: "self", summary: "SUSE Bug 1202687", url: "https://bugzilla.suse.com/1202687", }, { category: "self", summary: "SUSE Bug 1202689", url: "https://bugzilla.suse.com/1202689", }, { category: "self", summary: "SUSE Bug 1202862", url: "https://bugzilla.suse.com/1202862", }, { category: "self", summary: "SUSE Bug 1202962", url: "https://bugzilla.suse.com/1202962", }, { category: "self", summary: "SUSE Bug 1203110", url: "https://bugzilla.suse.com/1203110", }, { category: "self", summary: "SUSE Bug 1203152", url: "https://bugzilla.suse.com/1203152", }, { category: "self", summary: "SUSE Bug 1203155", url: "https://bugzilla.suse.com/1203155", }, { category: "self", summary: "SUSE Bug 1203194", url: "https://bugzilla.suse.com/1203194", }, { category: "self", summary: "SUSE Bug 1203272", url: "https://bugzilla.suse.com/1203272", }, { category: "self", summary: "SUSE Bug 1203508", url: "https://bugzilla.suse.com/1203508", }, { category: "self", summary: "SUSE Bug 1203509", url: "https://bugzilla.suse.com/1203509", }, { category: "self", summary: "SUSE Bug 1203796", url: "https://bugzilla.suse.com/1203796", }, { category: "self", summary: "SUSE Bug 1203797", url: "https://bugzilla.suse.com/1203797", }, { category: "self", summary: "SUSE Bug 1203799", url: "https://bugzilla.suse.com/1203799", }, { category: "self", summary: "SUSE Bug 1203820", url: "https://bugzilla.suse.com/1203820", }, { category: "self", summary: "SUSE Bug 1203924", url: "https://bugzilla.suse.com/1203924", }, { category: "self", summary: "SUSE Bug 1204779", url: "https://bugzilla.suse.com/1204779", }, { category: "self", summary: "SUSE CVE CVE-2009-0316 page", url: "https://www.suse.com/security/cve/CVE-2009-0316/", }, { category: "self", summary: "SUSE CVE CVE-2016-1248 page", url: "https://www.suse.com/security/cve/CVE-2016-1248/", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2017-5953 page", url: "https://www.suse.com/security/cve/CVE-2017-5953/", }, { category: "self", summary: "SUSE CVE CVE-2017-6349 page", url: "https://www.suse.com/security/cve/CVE-2017-6349/", }, { category: "self", summary: "SUSE CVE CVE-2017-6350 page", url: "https://www.suse.com/security/cve/CVE-2017-6350/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2257 page", url: "https://www.suse.com/security/cve/CVE-2022-2257/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2285 page", url: "https://www.suse.com/security/cve/CVE-2022-2285/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2522 page", url: "https://www.suse.com/security/cve/CVE-2022-2522/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2845 page", url: "https://www.suse.com/security/cve/CVE-2022-2845/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3099 page", url: "https://www.suse.com/security/cve/CVE-2022-3099/", }, { category: "self", summary: "SUSE CVE CVE-2022-3134 page", url: "https://www.suse.com/security/cve/CVE-2022-3134/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, { category: "self", summary: "SUSE CVE CVE-2022-3234 page", url: "https://www.suse.com/security/cve/CVE-2022-3234/", }, { category: "self", summary: "SUSE CVE CVE-2022-3235 page", url: "https://www.suse.com/security/cve/CVE-2022-3235/", }, { category: "self", summary: "SUSE CVE CVE-2022-3278 page", url: "https://www.suse.com/security/cve/CVE-2022-3278/", }, { category: "self", summary: "SUSE CVE CVE-2022-3296 page", url: "https://www.suse.com/security/cve/CVE-2022-3296/", }, { category: "self", summary: "SUSE CVE CVE-2022-3297 page", url: "https://www.suse.com/security/cve/CVE-2022-3297/", }, { category: "self", summary: "SUSE CVE CVE-2022-3324 page", url: "https://www.suse.com/security/cve/CVE-2022-3324/", }, { category: "self", summary: "SUSE CVE CVE-2022-3352 page", url: "https://www.suse.com/security/cve/CVE-2022-3352/", }, { category: "self", summary: "SUSE CVE CVE-2022-3705 page", url: "https://www.suse.com/security/cve/CVE-2022-3705/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-12-27T04:16:45Z", generator: { date: "2022-12-27T04:16:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4619-1", initial_release_date: "2022-12-27T04:16:45Z", revision_history: [ { date: "2022-12-27T04:16:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.aarch64", product: { name: "gvim-9.0.0814-17.9.1.aarch64", product_id: "gvim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.aarch64", product: { name: "vim-9.0.0814-17.9.1.aarch64", product_id: "vim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.aarch64", product: { name: "vim-small-9.0.0814-17.9.1.aarch64", product_id: "vim-small-9.0.0814-17.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.i586", product: { name: "gvim-9.0.0814-17.9.1.i586", product_id: "gvim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.i586", product: { name: "vim-9.0.0814-17.9.1.i586", product_id: "vim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.i586", product: { name: "vim-small-9.0.0814-17.9.1.i586", product_id: "vim-small-9.0.0814-17.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-9.0.0814-17.9.1.noarch", product: { name: "vim-data-9.0.0814-17.9.1.noarch", product_id: "vim-data-9.0.0814-17.9.1.noarch", }, }, { category: "product_version", name: "vim-data-common-9.0.0814-17.9.1.noarch", product: { name: "vim-data-common-9.0.0814-17.9.1.noarch", product_id: "vim-data-common-9.0.0814-17.9.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.ppc64le", product: { name: "gvim-9.0.0814-17.9.1.ppc64le", product_id: "gvim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.ppc64le", product: { name: "vim-9.0.0814-17.9.1.ppc64le", product_id: "vim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.ppc64le", product: { name: "vim-small-9.0.0814-17.9.1.ppc64le", product_id: "vim-small-9.0.0814-17.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.s390x", product: { name: "gvim-9.0.0814-17.9.1.s390x", product_id: "gvim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.s390x", product: { name: "vim-9.0.0814-17.9.1.s390x", product_id: "vim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.s390x", product: { name: "vim-small-9.0.0814-17.9.1.s390x", product_id: "vim-small-9.0.0814-17.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.x86_64", product: { name: "gvim-9.0.0814-17.9.1.x86_64", product_id: "gvim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.x86_64", product: { name: "vim-9.0.0814-17.9.1.x86_64", product_id: "vim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.x86_64", product: { name: "vim-small-9.0.0814-17.9.1.x86_64", product_id: "vim-small-9.0.0814-17.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0316", }, ], notes: [ { category: "general", text: "Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2009-0316", url: "https://www.suse.com/security/cve/CVE-2009-0316", }, { category: "external", summary: "SUSE Bug 470100 for CVE-2009-0316", url: "https://bugzilla.suse.com/470100", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2009-0316", }, { cve: "CVE-2016-1248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1248", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-1248", url: "https://www.suse.com/security/cve/CVE-2016-1248", }, { category: "external", summary: "SUSE Bug 1010685 for CVE-2016-1248", url: "https://bugzilla.suse.com/1010685", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2016-1248", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2016-1248", }, { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2017-5953", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5953", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-5953", url: "https://www.suse.com/security/cve/CVE-2017-5953", }, { category: "external", summary: "SUSE Bug 1024724 for CVE-2017-5953", url: "https://bugzilla.suse.com/1024724", }, { category: "external", summary: "SUSE Bug 1123143 for CVE-2017-5953", url: "https://bugzilla.suse.com/1123143", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2017-5953", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2017-5953", }, { cve: "CVE-2017-6349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6349", }, ], notes: [ { category: "general", text: "An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6349", url: "https://www.suse.com/security/cve/CVE-2017-6349", }, { category: "external", summary: "SUSE Bug 1027057 for CVE-2017-6349", url: "https://bugzilla.suse.com/1027057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6349", }, { cve: "CVE-2017-6350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6350", }, ], notes: [ { category: "general", text: "An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6350", url: "https://www.suse.com/security/cve/CVE-2017-6350", }, { category: "external", summary: "SUSE Bug 1027053 for CVE-2017-6350", url: "https://bugzilla.suse.com/1027053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6350", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2257", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2257", url: "https://www.suse.com/security/cve/CVE-2022-2257", }, { category: "external", summary: "SUSE Bug 1201154 for CVE-2022-2257", url: "https://bugzilla.suse.com/1201154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2285", }, ], notes: [ { category: "general", text: "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2285", url: "https://www.suse.com/security/cve/CVE-2022-2285", }, { category: "external", summary: "SUSE Bug 1201134 for CVE-2022-2285", url: "https://bugzilla.suse.com/1201134", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2522", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2522", url: "https://www.suse.com/security/cve/CVE-2022-2522", }, { category: "external", summary: "SUSE Bug 1201863 for CVE-2022-2522", url: "https://bugzilla.suse.com/1201863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2522", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2845", }, ], notes: [ { category: "general", text: "Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2845", url: "https://www.suse.com/security/cve/CVE-2022-2845", }, { category: "external", summary: "SUSE Bug 1202515 for CVE-2022-2845", url: "https://bugzilla.suse.com/1202515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3099", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0360.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3099", url: "https://www.suse.com/security/cve/CVE-2022-3099", }, { category: "external", summary: "SUSE Bug 1203110 for CVE-2022-3099", url: "https://bugzilla.suse.com/1203110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3099", }, { cve: "CVE-2022-3134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3134", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0389.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3134", url: "https://www.suse.com/security/cve/CVE-2022-3134", }, { category: "external", summary: "SUSE Bug 1203194 for CVE-2022-3134", url: "https://bugzilla.suse.com/1203194", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3153", }, { cve: "CVE-2022-3234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3234", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3234", url: "https://www.suse.com/security/cve/CVE-2022-3234", }, { category: "external", summary: "SUSE Bug 1203508 for CVE-2022-3234", url: "https://bugzilla.suse.com/1203508", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3234", url: "https://bugzilla.suse.com/1206240", }, { category: "external", summary: "SUSE Bug 1208002 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208002", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208651", }, { category: "external", summary: "SUSE Bug 1209329 for CVE-2022-3234", url: "https://bugzilla.suse.com/1209329", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3235", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0490.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3235", url: "https://www.suse.com/security/cve/CVE-2022-3235", }, { category: "external", summary: "SUSE Bug 1203509 for CVE-2022-3235", url: "https://bugzilla.suse.com/1203509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3235", }, { cve: "CVE-2022-3278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3278", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3278", url: "https://www.suse.com/security/cve/CVE-2022-3278", }, { category: "external", summary: "SUSE Bug 1203799 for CVE-2022-3278", url: "https://bugzilla.suse.com/1203799", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3296", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3296", url: "https://www.suse.com/security/cve/CVE-2022-3296", }, { category: "external", summary: "SUSE Bug 1203796 for CVE-2022-3296", url: "https://bugzilla.suse.com/1203796", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3296", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3297", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0579.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3297", url: "https://www.suse.com/security/cve/CVE-2022-3297", }, { category: "external", summary: "SUSE Bug 1203797 for CVE-2022-3297", url: "https://bugzilla.suse.com/1203797", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3297", }, { cve: "CVE-2022-3324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3324", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3324", url: "https://www.suse.com/security/cve/CVE-2022-3324", }, { category: "external", summary: "SUSE Bug 1203820 for CVE-2022-3324", url: "https://bugzilla.suse.com/1203820", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3324", url: "https://bugzilla.suse.com/1205395", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3324", url: "https://bugzilla.suse.com/1206240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3352", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0614.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3352", url: "https://www.suse.com/security/cve/CVE-2022-3352", }, { category: "external", summary: "SUSE Bug 1203924 for CVE-2022-3352", url: "https://bugzilla.suse.com/1203924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3352", }, { cve: "CVE-2022-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3705", }, ], notes: [ { category: "general", text: "A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3705", url: "https://www.suse.com/security/cve/CVE-2022-3705", }, { category: "external", summary: "SUSE Bug 1204779 for CVE-2022-3705", url: "https://bugzilla.suse.com/1204779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3705", }, ], }
suse-su-2022:0736-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).\n- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).\n- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).\n- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).\n- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).\n- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).\n- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).\n- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).\n- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).\n- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).\n- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-736,SUSE-SLE-Module-Basesystem-15-SP3-2022-736,SUSE-SLE-Module-Basesystem-15-SP4-2022-736,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-736,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-736,SUSE-SLE-Product-HPC-15-2022-736,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-736,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-736,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-736,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-736,SUSE-SLE-Product-RT-15-SP2-2022-736,SUSE-SLE-Product-SLES-15-2022-736,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-736,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-736,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-736,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-736,SUSE-SLE-Product-SLES_SAP-15-2022-736,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-736,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-736,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-736,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-736,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-736,SUSE-SUSE-MicroOS-5.0-2022-736,SUSE-SUSE-MicroOS-5.1-2022-736,SUSE-Storage-6-2022-736,SUSE-Storage-7-2022-736", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_0736-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:0736-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20220736-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:0736-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-03-04T13:54:09Z", generator: { date: "2022-03-04T13:54:09Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:0736-1", initial_release_date: "2022-03-04T13:54:09Z", revision_history: [ { date: "2022-03-04T13:54:09Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.aarch64", product: { name: "gvim-8.0.1568-5.17.1.aarch64", product_id: "gvim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.aarch64", product: { name: "vim-8.0.1568-5.17.1.aarch64", product_id: "vim-8.0.1568-5.17.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.aarch64", product: { name: "vim-small-8.0.1568-5.17.1.aarch64", product_id: "vim-small-8.0.1568-5.17.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.i586", product: { name: "gvim-8.0.1568-5.17.1.i586", product_id: "gvim-8.0.1568-5.17.1.i586", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.i586", product: { name: "vim-8.0.1568-5.17.1.i586", product_id: "vim-8.0.1568-5.17.1.i586", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.i586", product: { name: "vim-small-8.0.1568-5.17.1.i586", product_id: "vim-small-8.0.1568-5.17.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-8.0.1568-5.17.1.noarch", product: { name: "vim-data-8.0.1568-5.17.1.noarch", product_id: "vim-data-8.0.1568-5.17.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.0.1568-5.17.1.noarch", product: { name: "vim-data-common-8.0.1568-5.17.1.noarch", product_id: "vim-data-common-8.0.1568-5.17.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.ppc64le", product: { name: "gvim-8.0.1568-5.17.1.ppc64le", product_id: "gvim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.ppc64le", product: { name: "vim-8.0.1568-5.17.1.ppc64le", product_id: "vim-8.0.1568-5.17.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.ppc64le", product: { name: "vim-small-8.0.1568-5.17.1.ppc64le", product_id: "vim-small-8.0.1568-5.17.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.s390x", product: { name: "gvim-8.0.1568-5.17.1.s390x", product_id: "gvim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.s390x", product: { name: "vim-8.0.1568-5.17.1.s390x", product_id: "vim-8.0.1568-5.17.1.s390x", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.s390x", product: { name: "vim-small-8.0.1568-5.17.1.s390x", product_id: "vim-small-8.0.1568-5.17.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.0.1568-5.17.1.x86_64", product: { name: "gvim-8.0.1568-5.17.1.x86_64", product_id: "gvim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-8.0.1568-5.17.1.x86_64", product: { name: "vim-8.0.1568-5.17.1.x86_64", product_id: "vim-8.0.1568-5.17.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.0.1568-5.17.1.x86_64", product: { name: "vim-small-8.0.1568-5.17.1.x86_64", product_id: "vim-small-8.0.1568-5.17.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Real Time 15 SP2", product: { name: "SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle_rt:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.0", product: { name: "SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.0", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-small-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-small-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", }, product_reference: "vim-small-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-small-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP2", product_id: "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", }, product_reference: "gvim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", }, product_reference: "gvim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", }, product_reference: "vim-8.0.1568-5.17.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", }, product_reference: "vim-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-small-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0", product_id: "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-small-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.0", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-small-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", }, product_reference: "vim-small-8.0.1568-5.17.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.0.1568-5.17.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-small-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", }, product_reference: "gvim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.0.1568-5.17.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", }, product_reference: "gvim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", }, product_reference: "vim-8.0.1568-5.17.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.0.1568-5.17.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", }, product_reference: "vim-8.0.1568-5.17.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.0.1568-5.17.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.0.1568-5.17.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", }, product_reference: "vim-data-common-8.0.1568-5.17.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 6:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.aarch64", "SUSE Enterprise Storage 7:vim-8.0.1568-5.17.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.0.1568-5.17.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.0:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Real Time 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.0.1568-5.17.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.0.1568-5.17.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:gvim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.ppc64le", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.s390x", "SUSE Manager Server 4.1:vim-8.0.1568-5.17.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.0.1568-5.17.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.0.1568-5.17.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-03-04T13:54:09Z", details: "important", }, ], title: "CVE-2022-0413", }, ], }
suse-su-2022:2102-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955).\n- CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770).\n- CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167).\n- CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902).\n- CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903).\n- CVE-2021-3974: Fixed use-after-free (bsc#1192904).\n- CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466).\n- CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905).\n- CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093).\n- CVE-2021-4192: Fixed use-after-free (bsc#1194217).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388).\n- CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885).\n- CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872).\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203).\n- CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332).\n- CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354).\n- CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361).\n- CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596).\n- CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748).\n- CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331).\n- CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333).\n- CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334).\n- CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655).\n- CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651).\n- CVE-2022-1771: Fixed stack exhaustion (bsc#1199693).\n- CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745).\n- CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747).\n- CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936).\n- CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010).\n- CVE-2022-1898: Fixed use-after-free (bsc#1200011).\n- CVE-2022-1927: Fixed buffer over-read (bsc#1200012).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2102,SUSE-SLE-Module-Basesystem-15-SP3-2022-2102,SUSE-SLE-Module-Basesystem-15-SP4-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2102,SUSE-SLE-Product-HPC-15-2022-2102,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-2022-2102,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES_SAP-15-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2102,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2102,SUSE-SUSE-MicroOS-5.1-2022-2102,SUSE-SUSE-MicroOS-5.2-2022-2102,SUSE-Storage-6-2022-2102,SUSE-Storage-7-2022-2102,openSUSE-SLE-15.3-2022-2102,openSUSE-SLE-15.4-2022-2102", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2102-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2102-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222102-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2102-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-06-16T13:18:54Z", generator: { date: "2022-06-16T13:18:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2102-1", initial_release_date: "2022-06-16T13:18:54Z", revision_history: [ { date: "2022-06-16T13:18:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.aarch64", product: { name: "gvim-8.2.5038-150000.5.21.1.aarch64", product_id: "gvim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-small-8.2.5038-150000.5.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.i586", product: { name: "gvim-8.2.5038-150000.5.21.1.i586", product_id: "gvim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.i586", product: { name: "vim-8.2.5038-150000.5.21.1.i586", product_id: "vim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.i586", product: { name: "vim-small-8.2.5038-150000.5.21.1.i586", product_id: "vim-small-8.2.5038-150000.5.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-8.2.5038-150000.5.21.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-common-8.2.5038-150000.5.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product_id: "gvim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-small-8.2.5038-150000.5.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.s390x", product: { name: "gvim-8.2.5038-150000.5.21.1.s390x", product_id: "gvim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-8.2.5038-150000.5.21.1.s390x", product_id: "vim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-small-8.2.5038-150000.5.21.1.s390x", product_id: "vim-small-8.2.5038-150000.5.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.x86_64", product: { name: "gvim-8.2.5038-150000.5.21.1.x86_64", product_id: "gvim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-small-8.2.5038-150000.5.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1927", }, ], }
wid-sec-w-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
WID-SEC-W-2022-1335
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1335 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json", }, { category: "self", summary: "WID-SEC-2022-1335 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335", }, { category: "external", summary: "XEROX Security Advisory XRX23-007 vom 2023-05-18", url: "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-021 vom 2022-09-07", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:34:44.234+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1335", initial_release_date: "2022-09-07T22:00:00.000+00:00", revision_history: [ { date: "2022-09-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2018-25032", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2021-0561", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-0561", }, { cve: "CVE-2021-21708", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-21708", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-25220", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-25220", }, { cve: "CVE-2021-29923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-29923", }, { cve: "CVE-2021-30809", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30809", }, { cve: "CVE-2021-30818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30818", }, { cve: "CVE-2021-30823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30823", }, { cve: "CVE-2021-30836", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30836", }, { cve: "CVE-2021-30884", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30884", }, { cve: "CVE-2021-30887", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30887", }, { cve: "CVE-2021-30888", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30888", }, { cve: "CVE-2021-30889", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30889", }, { cve: "CVE-2021-30890", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30890", }, { cve: "CVE-2021-30897", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30897", }, { cve: "CVE-2021-30934", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30934", }, { cve: "CVE-2021-30936", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30936", }, { cve: "CVE-2021-30951", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30951", }, { cve: "CVE-2021-30952", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30952", }, { cve: "CVE-2021-30953", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30953", }, { cve: "CVE-2021-30954", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30954", }, { cve: "CVE-2021-30984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30984", }, { cve: "CVE-2021-3448", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-3448", }, { cve: "CVE-2021-34558", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-34558", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-4115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4115", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-41772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41772", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4217", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4217", }, { cve: "CVE-2021-43519", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43519", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-45481", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45481", }, { cve: "CVE-2021-45482", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45482", }, { cve: "CVE-2021-45483", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45483", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0408", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0417", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0417", }, { cve: "CVE-2022-0443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0443", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1097", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1097", }, { cve: "CVE-2022-1196", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1196", }, { cve: "CVE-2022-1197", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1197", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1520", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1520", }, { cve: "CVE-2022-1834", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1834", }, { cve: "CVE-2022-21245", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21245", }, { cve: "CVE-2022-21270", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21270", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21303", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21303", }, { cve: "CVE-2022-21304", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21304", }, { cve: "CVE-2022-21344", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21344", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21367", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21367", }, { cve: "CVE-2022-21426", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21426", }, { cve: "CVE-2022-21434", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21434", }, { cve: "CVE-2022-21443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21443", }, { cve: "CVE-2022-21449", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21449", }, { cve: "CVE-2022-21476", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21476", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21496", }, { cve: "CVE-2022-21514", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21514", }, { cve: "CVE-2022-21524", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21524", }, { cve: "CVE-2022-21533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21533", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-22590", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22590", }, { cve: "CVE-2022-22592", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22592", }, { cve: "CVE-2022-22620", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22620", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-23806", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23806", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24130", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24130", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-24675", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24675", }, { cve: "CVE-2022-24713", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24713", }, { cve: "CVE-2022-24801", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24801", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-25762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25762", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26486", }, { cve: "CVE-2022-28281", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28281", }, { cve: "CVE-2022-28282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28282", }, { cve: "CVE-2022-28285", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28285", }, { cve: "CVE-2022-28286", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28286", }, { cve: "CVE-2022-28289", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28289", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-28346", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28346", }, { cve: "CVE-2022-28347", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28347", }, { cve: "CVE-2022-29824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29824", }, { cve: "CVE-2022-29909", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29909", }, { cve: "CVE-2022-29911", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29911", }, { cve: "CVE-2022-29912", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29912", }, { cve: "CVE-2022-29913", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29913", }, { cve: "CVE-2022-29914", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29914", }, { cve: "CVE-2022-29916", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29916", }, { cve: "CVE-2022-29917", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29917", }, { cve: "CVE-2022-31736", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31736", }, { cve: "CVE-2022-31737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31737", }, { cve: "CVE-2022-31738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31738", }, { cve: "CVE-2022-31739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31739", }, { cve: "CVE-2022-3174", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-3174", }, { cve: "CVE-2022-31740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31740", }, { cve: "CVE-2022-31741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31741", }, { cve: "CVE-2022-31742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31742", }, { cve: "CVE-2022-31747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31747", }, { cve: "CVE-2022-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-4187", }, ], }
WID-SEC-W-2022-1846
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1846 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json", }, { category: "self", summary: "WID-SEC-2022-1846 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846", }, { category: "external", summary: "Apple Security Advisory HT213488 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213488", }, { category: "external", summary: "Apple Security Advisory HT213493 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213493", }, { category: "external", summary: "Apple Security Advisory HT213494 vom 2022-10-24", url: "https://support.apple.com/en-us/HT213494", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-16T22:00:00.000+00:00", generator: { date: "2024-09-17T08:17:03.625+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-1846", initial_release_date: "2022-10-24T22:00:00.000+00:00", revision_history: [ { date: "2022-10-24T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-10-27T22:00:00.000+00:00", number: "2", summary: "CVEs ergänzt", }, { date: "2023-06-27T22:00:00.000+00:00", number: "3", summary: "CVE's ergänzt", }, { date: "2023-08-14T22:00:00.000+00:00", number: "4", summary: "CVE Nummern ergänzt", }, { date: "2024-06-10T22:00:00.000+00:00", number: "5", summary: "CVE's ergänzt", }, { date: "2024-09-16T22:00:00.000+00:00", number: "6", summary: "CVE-2022-46723 ergänzt", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "Ventura_13", product: { name: "Apple macOS Ventura_13", product_id: "T025102", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:ventura_13", }, }, }, { category: "product_version", name: "Big Sur 11.7.1", product: { name: "Apple macOS Big Sur 11.7.1", product_id: "T025103", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur_11.7.1", }, }, }, { category: "product_version", name: "Monterey 12.6.1", product: { name: "Apple macOS Monterey 12.6.1", product_id: "T025104", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey_12.6.1", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-39537", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2021-39537", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0368", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0368", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0943", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-0943", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1621", }, { cve: "CVE-2022-1622", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1622", }, { cve: "CVE-2022-1629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1629", }, { cve: "CVE-2022-1674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1674", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1725", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1769", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1942", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1942", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-2000", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2000", }, { cve: "CVE-2022-2042", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2042", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-26699", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26699", }, { cve: "CVE-2022-26730", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-26730", }, { cve: "CVE-2022-28739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-28739", }, { cve: "CVE-2022-29458", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-29458", }, { cve: "CVE-2022-32205", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32205", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32207", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32207", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32827", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32827", }, { cve: "CVE-2022-32835", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32835", }, { cve: "CVE-2022-32858", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32858", }, { cve: "CVE-2022-32859", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32859", }, { cve: "CVE-2022-32862", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32862", }, { cve: "CVE-2022-32864", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32864", }, { cve: "CVE-2022-32865", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32865", }, { cve: "CVE-2022-32866", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32866", }, { cve: "CVE-2022-32867", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32867", }, { cve: "CVE-2022-32870", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32870", }, { cve: "CVE-2022-32875", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32875", }, { cve: "CVE-2022-32876", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32876", }, { cve: "CVE-2022-32877", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32877", }, { cve: "CVE-2022-32879", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32879", }, { cve: "CVE-2022-32881", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32881", }, { cve: "CVE-2022-32883", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32883", }, { cve: "CVE-2022-32886", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32886", }, { cve: "CVE-2022-32888", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32888", }, { cve: "CVE-2022-32890", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32890", }, { cve: "CVE-2022-32892", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32892", }, { cve: "CVE-2022-32895", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32895", }, { cve: "CVE-2022-32898", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32898", }, { cve: "CVE-2022-32899", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32899", }, { cve: "CVE-2022-32902", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32902", }, { cve: "CVE-2022-32903", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32903", }, { cve: "CVE-2022-32904", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32904", }, { cve: "CVE-2022-32905", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32905", }, { cve: "CVE-2022-32907", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32907", }, { cve: "CVE-2022-32908", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32908", }, { cve: "CVE-2022-32909", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32909", }, { cve: "CVE-2022-32911", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32911", }, { cve: "CVE-2022-32912", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32912", }, { cve: "CVE-2022-32913", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32913", }, { cve: "CVE-2022-32914", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32914", }, { cve: "CVE-2022-32915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32915", }, { cve: "CVE-2022-32918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32918", }, { cve: "CVE-2022-32922", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32922", }, { cve: "CVE-2022-32924", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32924", }, { cve: "CVE-2022-32928", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32928", }, { cve: "CVE-2022-32934", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32934", }, { cve: "CVE-2022-32936", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32936", }, { cve: "CVE-2022-32938", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32938", }, { cve: "CVE-2022-32940", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32940", }, { cve: "CVE-2022-32947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-32947", }, { cve: "CVE-2022-42788", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42788", }, { cve: "CVE-2022-42789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42789", }, { cve: "CVE-2022-42790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42790", }, { cve: "CVE-2022-42791", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42791", }, { cve: "CVE-2022-42793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42793", }, { cve: "CVE-2022-42795", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42795", }, { cve: "CVE-2022-42796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42796", }, { cve: "CVE-2022-42799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42799", }, { cve: "CVE-2022-42806", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42806", }, { cve: "CVE-2022-42808", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42808", }, { cve: "CVE-2022-42809", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42809", }, { cve: "CVE-2022-42811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42811", }, { cve: "CVE-2022-42813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42813", }, { cve: "CVE-2022-42814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42814", }, { cve: "CVE-2022-42815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42815", }, { cve: "CVE-2022-42818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42818", }, { cve: "CVE-2022-42819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42819", }, { cve: "CVE-2022-42820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42820", }, { cve: "CVE-2022-42823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42823", }, { cve: "CVE-2022-42824", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42824", }, { cve: "CVE-2022-42825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42825", }, { cve: "CVE-2022-42828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42828", }, { cve: "CVE-2022-42829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42829", }, { cve: "CVE-2022-42830", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42830", }, { cve: "CVE-2022-42831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42831", }, { cve: "CVE-2022-42832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42832", }, { cve: "CVE-2022-42833", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42833", }, { cve: "CVE-2022-42834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42834", }, { cve: "CVE-2022-42838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42838", }, { cve: "CVE-2022-42860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-42860", }, { cve: "CVE-2022-46709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46709", }, { cve: "CVE-2022-46712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46712", }, { cve: "CVE-2022-46713", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46713", }, { cve: "CVE-2022-46721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46721", }, { cve: "CVE-2022-46722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46722", }, { cve: "CVE-2022-46723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-46723", }, { cve: "CVE-2022-47915", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47915", }, { cve: "CVE-2022-47965", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-47965", }, { cve: "CVE-2022-48504", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48504", }, { cve: "CVE-2022-48505", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48505", }, { cve: "CVE-2022-48577", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48577", }, { cve: "CVE-2022-48683", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T025103", "T025102", "T025104", ], }, release_date: "2022-10-24T22:00:00.000+00:00", title: "CVE-2022-48683", }, ], }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
wid-sec-w-2022-0052
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um einen Denial of Service Angriff durchzuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0052 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0052.json", }, { category: "self", summary: "WID-SEC-2022-0052 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0052", }, { category: "external", summary: "Ubuntu Security Notice USN-6026-1 vom 2023-04-19", url: "https://ubuntu.com/security/notices/USN-6026-1", }, { category: "external", summary: "NIST Vulnerability Database vom 2022-01-23", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, { category: "external", summary: "NIST Vulnerability Database vom 2022-01-23", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0319", }, { category: "external", summary: "Ubuntu Security Notice USN-5458-1 vom 2022-06-02", url: "https://ubuntu.com/security/notices/USN-5458-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-020 vom 2022-02-03", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-020.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1567 vom 2022-02-19", url: "https://alas.aws.amazon.com/ALAS-2022-1567.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1751 vom 2022-02-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1751.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0736-1 vom 2022-03-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html", }, { category: "external", summary: "Debian Security Advisory DLA-2947 vom 2022-03-12", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5433-1 vom 2022-05-23", url: "https://ubuntu.com/security/notices/USN-5433-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0894 vom 2022-03-15", url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-0894 vom 2022-03-16", url: "http://linux.oracle.com/errata/ELSA-2022-0894.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-030 vom 2022-03-21", url: "https://downloads.avaya.com/css/P8/documents/101080962", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1597 vom 2022-06-10", url: "https://alas.aws.amazon.com/ALAS-2022-1597.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0736-2 vom 2022-04-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:1476 vom 2022-04-21", url: "https://access.redhat.com/errata/RHSA-2022:1476", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5319 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5319.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Debian Security Advisory DLA-3182 vom 2022-11-08", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html", }, { category: "external", summary: "Debian Security Advisory DLA-3204 vom 2022-11-24", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:08.981+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0052", initial_release_date: "2022-01-23T23:00:00.000+00:00", revision_history: [ { date: "2022-01-23T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-01-27T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-7E9E1AE1FB", }, { date: "2022-02-03T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-20T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-21T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-03-06T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-13T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-15T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-03-16T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-03-22T23:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-04-19T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-21T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-05-23T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-02T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-09T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-16T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-03T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "19", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-11-23T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-04-18T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "22", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source vim < 8.2.4154", product: { name: "Open Source vim < 8.2.4154", product_id: "T021800", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4154", }, }, }, { category: "product_name", name: "Open Source vim < 8.2.4151", product: { name: "Open Source vim < 8.2.4151", product_id: "T021801", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4151", }, }, }, ], category: "product_name", name: "vim", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0318", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Heap basierten Pufferüberlaufs. Ein lokaler Angreifer kann das ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "T002207", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-01-23T23:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Out-of-Bounds Read Fehlers. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "398363", "T012167", "T004914", ], }, release_date: "2022-01-23T23:00:00.000+00:00", title: "CVE-2022-0319", }, ], }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1335 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json", }, { category: "self", summary: "WID-SEC-2022-1335 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335", }, { category: "external", summary: "XEROX Security Advisory XRX23-007 vom 2023-05-18", url: "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-021 vom 2022-09-07", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:34:44.234+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1335", initial_release_date: "2022-09-07T22:00:00.000+00:00", revision_history: [ { date: "2022-09-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2018-25032", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2021-0561", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-0561", }, { cve: "CVE-2021-21708", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-21708", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-25220", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-25220", }, { cve: "CVE-2021-29923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-29923", }, { cve: "CVE-2021-30809", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30809", }, { cve: "CVE-2021-30818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30818", }, { cve: "CVE-2021-30823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30823", }, { cve: "CVE-2021-30836", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30836", }, { cve: "CVE-2021-30884", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30884", }, { cve: "CVE-2021-30887", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30887", }, { cve: "CVE-2021-30888", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30888", }, { cve: "CVE-2021-30889", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30889", }, { cve: "CVE-2021-30890", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30890", }, { cve: "CVE-2021-30897", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30897", }, { cve: "CVE-2021-30934", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30934", }, { cve: "CVE-2021-30936", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30936", }, { cve: "CVE-2021-30951", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30951", }, { cve: "CVE-2021-30952", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30952", }, { cve: "CVE-2021-30953", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30953", }, { cve: "CVE-2021-30954", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30954", }, { cve: "CVE-2021-30984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30984", }, { cve: "CVE-2021-3448", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-3448", }, { cve: "CVE-2021-34558", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-34558", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-4115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4115", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-41772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41772", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4217", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4217", }, { cve: "CVE-2021-43519", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43519", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-45481", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45481", }, { cve: "CVE-2021-45482", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45482", }, { cve: "CVE-2021-45483", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45483", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0408", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0417", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0417", }, { cve: "CVE-2022-0443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0443", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1097", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1097", }, { cve: "CVE-2022-1196", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1196", }, { cve: "CVE-2022-1197", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1197", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1520", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1520", }, { cve: "CVE-2022-1834", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1834", }, { cve: "CVE-2022-21245", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21245", }, { cve: "CVE-2022-21270", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21270", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21303", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21303", }, { cve: "CVE-2022-21304", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21304", }, { cve: "CVE-2022-21344", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21344", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21367", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21367", }, { cve: "CVE-2022-21426", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21426", }, { cve: "CVE-2022-21434", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21434", }, { cve: "CVE-2022-21443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21443", }, { cve: "CVE-2022-21449", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21449", }, { cve: "CVE-2022-21476", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21476", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21496", }, { cve: "CVE-2022-21514", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21514", }, { cve: "CVE-2022-21524", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21524", }, { cve: "CVE-2022-21533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21533", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-22590", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22590", }, { cve: "CVE-2022-22592", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22592", }, { cve: "CVE-2022-22620", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22620", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-23806", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23806", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24130", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24130", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-24675", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24675", }, { cve: "CVE-2022-24713", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24713", }, { cve: "CVE-2022-24801", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24801", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-25762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25762", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26486", }, { cve: "CVE-2022-28281", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28281", }, { cve: "CVE-2022-28282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28282", }, { cve: "CVE-2022-28285", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28285", }, { cve: "CVE-2022-28286", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28286", }, { cve: "CVE-2022-28289", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28289", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-28346", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28346", }, { cve: "CVE-2022-28347", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28347", }, { cve: "CVE-2022-29824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29824", }, { cve: "CVE-2022-29909", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29909", }, { cve: "CVE-2022-29911", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29911", }, { cve: "CVE-2022-29912", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29912", }, { cve: "CVE-2022-29913", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29913", }, { cve: "CVE-2022-29914", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29914", }, { cve: "CVE-2022-29916", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29916", }, { cve: "CVE-2022-29917", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29917", }, { cve: "CVE-2022-31736", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31736", }, { cve: "CVE-2022-31737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31737", }, { cve: "CVE-2022-31738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31738", }, { cve: "CVE-2022-31739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31739", }, { cve: "CVE-2022-3174", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-3174", }, { cve: "CVE-2022-31740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31740", }, { cve: "CVE-2022-31741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31741", }, { cve: "CVE-2022-31742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31742", }, { cve: "CVE-2022-31747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31747", }, { cve: "CVE-2022-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-4187", }, ], }
WID-SEC-W-2022-0052
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um einen Denial of Service Angriff durchzuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0052 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0052.json", }, { category: "self", summary: "WID-SEC-2022-0052 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0052", }, { category: "external", summary: "Ubuntu Security Notice USN-6026-1 vom 2023-04-19", url: "https://ubuntu.com/security/notices/USN-6026-1", }, { category: "external", summary: "NIST Vulnerability Database vom 2022-01-23", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, { category: "external", summary: "NIST Vulnerability Database vom 2022-01-23", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0319", }, { category: "external", summary: "Ubuntu Security Notice USN-5458-1 vom 2022-06-02", url: "https://ubuntu.com/security/notices/USN-5458-1", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-020 vom 2022-02-03", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-020.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1567 vom 2022-02-19", url: "https://alas.aws.amazon.com/ALAS-2022-1567.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1751 vom 2022-02-21", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1751.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0736-1 vom 2022-03-04", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html", }, { category: "external", summary: "Debian Security Advisory DLA-2947 vom 2022-03-12", url: "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5433-1 vom 2022-05-23", url: "https://ubuntu.com/security/notices/USN-5433-1", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0894 vom 2022-03-15", url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-0894 vom 2022-03-16", url: "http://linux.oracle.com/errata/ELSA-2022-0894.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-030 vom 2022-03-21", url: "https://downloads.avaya.com/css/P8/documents/101080962", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1597 vom 2022-06-10", url: "https://alas.aws.amazon.com/ALAS-2022-1597.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:0736-2 vom 2022-04-20", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:1476 vom 2022-04-21", url: "https://access.redhat.com/errata/RHSA-2022:1476", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2022-5319 vom 2022-07-01", url: "http://linux.oracle.com/errata/ELSA-2022-5319.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, { category: "external", summary: "Debian Security Advisory DLA-3182 vom 2022-11-08", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html", }, { category: "external", summary: "Debian Security Advisory DLA-3204 vom 2022-11-24", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, ], source_lang: "en-US", title: "vim: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:26:08.981+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0052", initial_release_date: "2022-01-23T23:00:00.000+00:00", revision_history: [ { date: "2022-01-23T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-01-27T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-7E9E1AE1FB", }, { date: "2022-02-03T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-20T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-02-21T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-03-06T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-03-13T23:00:00.000+00:00", number: "7", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-03-15T23:00:00.000+00:00", number: "8", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-03-16T23:00:00.000+00:00", number: "9", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-03-22T23:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-04-19T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-04-21T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-05-23T22:00:00.000+00:00", number: "13", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-02T22:00:00.000+00:00", number: "14", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-06-09T22:00:00.000+00:00", number: "15", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-16T22:00:00.000+00:00", number: "16", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-07-03T22:00:00.000+00:00", number: "17", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "18", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-11-08T23:00:00.000+00:00", number: "19", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-11-23T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "21", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-04-18T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "22", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { branches: [ { category: "product_name", name: "Open Source vim < 8.2.4154", product: { name: "Open Source vim < 8.2.4154", product_id: "T021800", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4154", }, }, }, { category: "product_name", name: "Open Source vim < 8.2.4151", product: { name: "Open Source vim < 8.2.4151", product_id: "T021801", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.4151", }, }, }, ], category: "product_name", name: "vim", }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0318", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Heap basierten Pufferüberlaufs. Ein lokaler Angreifer kann das ausnutzen, um einen Denial of Service zu verursachen.", }, ], product_status: { known_affected: [ "T015519", "T015518", "2951", "T002207", "67646", "T015516", "T000126", "T015127", "398363", "T015126", "T012167", "T004914", ], }, release_date: "2022-01-23T23:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Out-of-Bounds Read Fehlers. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "2951", "T002207", "67646", "T000126", "398363", "T012167", "T004914", ], }, release_date: "2022-01-23T23:00:00.000+00:00", title: "CVE-2022-0319", }, ], }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
RHSA-2022:0894
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261)\n\n* vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318)\n\n* vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359)\n\n* vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361)\n\n* vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392)\n\n* vim: Use after free in src/ex_cmds.c (CVE-2022-0413)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0894", url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0894.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T18:21:00+00:00", generator: { date: "2024-11-22T18:21:00+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:0894", initial_release_date: "2022-03-15T10:25:38+00:00", revision_history: [ { date: "2022-03-15T10:25:38+00:00", number: "1", summary: "Initial version", }, { date: "2022-03-15T10:25:38+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T18:21:00+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_id: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-16.el8_5.12?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-16.el8_5.12.src", product: { name: "vim-2:8.0.1763-16.el8_5.12.src", product_id: "vim-2:8.0.1763-16.el8_5.12.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-16.el8_5.12?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0261", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2044607", }, ], notes: [ { category: "description", text: "A heap based out-of-bounds write flaw was found in vim's ops.c. This flaw allows an attacker to trick a user to open a crafted file triggering an out-of-bounds write. This vulnerability is capable of crashing software, modify memory, and possible code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 6 and 7 are not affected because the vulnerable code is not present in our code base.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "RHBZ#2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0261", url: "https://www.cve.org/CVERecord?id=CVE-2022-0261", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", }, { cve: "CVE-2022-0318", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2022-01-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2045355", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to reading beyond the end of a line in the utf_head_off function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "RHBZ#2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0318", url: "https://www.cve.org/CVERecord?id=CVE-2022-0318", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", }, { cve: "CVE-2022-0359", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2046479", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access with large 'tabstop' in Ex mode, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "RHBZ#2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0359", url: "https://www.cve.org/CVERecord?id=CVE-2022-0359", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", }, { cve: "CVE-2022-0361", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-02-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2050053", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access when copying lines in visual mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "RHBZ#2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0361", url: "https://www.cve.org/CVERecord?id=CVE-2022-0361", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", }, { cve: "CVE-2022-0392", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2049175", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access with bracketed paste in Ex mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "RHBZ#2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0392", url: "https://www.cve.org/CVERecord?id=CVE-2022-0392", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", }, ], release_date: "2022-01-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", }, { cve: "CVE-2022-0413", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-01-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2048519", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use after free in src/ex_cmds.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "RHBZ#2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0413", url: "https://www.cve.org/CVERecord?id=CVE-2022-0413", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", }, ], release_date: "2022-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use after free in src/ex_cmds.c", }, ], }
rhsa-2022:0894
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261)\n\n* vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318)\n\n* vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359)\n\n* vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361)\n\n* vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392)\n\n* vim: Use after free in src/ex_cmds.c (CVE-2022-0413)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0894", url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0894.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T18:21:00+00:00", generator: { date: "2024-11-22T18:21:00+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:0894", initial_release_date: "2022-03-15T10:25:38+00:00", revision_history: [ { date: "2022-03-15T10:25:38+00:00", number: "1", summary: "Initial version", }, { date: "2022-03-15T10:25:38+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T18:21:00+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_id: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-16.el8_5.12?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-16.el8_5.12.src", product: { name: "vim-2:8.0.1763-16.el8_5.12.src", product_id: "vim-2:8.0.1763-16.el8_5.12.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-16.el8_5.12?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0261", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2044607", }, ], notes: [ { category: "description", text: "A heap based out-of-bounds write flaw was found in vim's ops.c. This flaw allows an attacker to trick a user to open a crafted file triggering an out-of-bounds write. This vulnerability is capable of crashing software, modify memory, and possible code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 6 and 7 are not affected because the vulnerable code is not present in our code base.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "RHBZ#2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0261", url: "https://www.cve.org/CVERecord?id=CVE-2022-0261", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", }, { cve: "CVE-2022-0318", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2022-01-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2045355", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to reading beyond the end of a line in the utf_head_off function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "RHBZ#2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0318", url: "https://www.cve.org/CVERecord?id=CVE-2022-0318", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", }, { cve: "CVE-2022-0359", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2046479", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access with large 'tabstop' in Ex mode, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "RHBZ#2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0359", url: "https://www.cve.org/CVERecord?id=CVE-2022-0359", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", }, { cve: "CVE-2022-0361", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-02-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2050053", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access when copying lines in visual mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "RHBZ#2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0361", url: "https://www.cve.org/CVERecord?id=CVE-2022-0361", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", }, { cve: "CVE-2022-0392", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2049175", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access with bracketed paste in Ex mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "RHBZ#2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0392", url: "https://www.cve.org/CVERecord?id=CVE-2022-0392", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", }, ], release_date: "2022-01-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", }, { cve: "CVE-2022-0413", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-01-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2048519", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use after free in src/ex_cmds.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "RHBZ#2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0413", url: "https://www.cve.org/CVERecord?id=CVE-2022-0413", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", }, ], release_date: "2022-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use after free in src/ex_cmds.c", }, ], }
rhsa-2022_0894
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261)\n\n* vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318)\n\n* vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359)\n\n* vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361)\n\n* vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392)\n\n* vim: Use after free in src/ex_cmds.c (CVE-2022-0413)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2022:0894", url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0894.json", }, ], title: "Red Hat Security Advisory: vim security update", tracking: { current_release_date: "2024-11-22T18:21:00+00:00", generator: { date: "2024-11-22T18:21:00+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2022:0894", initial_release_date: "2022-03-15T10:25:38+00:00", revision_history: [ { date: "2022-03-15T10:25:38+00:00", number: "1", summary: "Initial version", }, { date: "2022-03-15T10:25:38+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T18:21:00+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AppStream (v. 8)", product: { name: "Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/a:redhat:enterprise_linux:8::appstream", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=aarch64&epoch=2", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=ppc64le&epoch=2", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=x86_64&epoch=2", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, { category: "product_version", name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_id: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.12?arch=s390x&epoch=2", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_id: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/vim-filesystem@8.0.1763-16.el8_5.12?arch=noarch&epoch=2", }, }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "vim-2:8.0.1763-16.el8_5.12.src", product: { name: "vim-2:8.0.1763-16.el8_5.12.src", product_id: "vim-2:8.0.1763-16.el8_5.12.src", product_identification_helper: { purl: "pkg:rpm/redhat/vim@8.0.1763-16.el8_5.12?arch=src&epoch=2", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", product_id: "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "AppStream-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-2:8.0.1763-16.el8_5.12.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", }, product_reference: "vim-2:8.0.1763-16.el8_5.12.src", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", }, product_reference: "vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, { category: "default_component_of", full_product_name: { name: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", }, product_reference: "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", relates_to_product_reference: "BaseOS-8.5.0.Z.MAIN", }, ], }, vulnerabilities: [ { cve: "CVE-2022-0261", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2044607", }, ], notes: [ { category: "description", text: "A heap based out-of-bounds write flaw was found in vim's ops.c. This flaw allows an attacker to trick a user to open a crafted file triggering an out-of-bounds write. This vulnerability is capable of crashing software, modify memory, and possible code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Enterprise Linux 6 and 7 are not affected because the vulnerable code is not present in our code base.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "RHBZ#2044607", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2044607", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0261", url: "https://www.cve.org/CVERecord?id=CVE-2022-0261", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0261", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in block_insert() in src/ops.c", }, { cve: "CVE-2022-0318", cwe: { id: "CWE-122", name: "Heap-based Buffer Overflow", }, discovery_date: "2022-01-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2045355", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to reading beyond the end of a line in the utf_head_off function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "RHBZ#2045355", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2045355", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0318", url: "https://www.cve.org/CVERecord?id=CVE-2022-0318", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, ], release_date: "2022-01-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in utf_head_off() in mbyte.c", }, { cve: "CVE-2022-0359", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2046479", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to Illegal memory access with large 'tabstop' in Ex mode, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "RHBZ#2046479", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2046479", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0359", url: "https://www.cve.org/CVERecord?id=CVE-2022-0359", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0359", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in init_ccline() in ex_getln.c", }, { cve: "CVE-2022-0361", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-02-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2050053", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access when copying lines in visual mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "RHBZ#2050053", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2050053", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0361", url: "https://www.cve.org/CVERecord?id=CVE-2022-0361", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0361", }, ], release_date: "2022-01-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow", }, { cve: "CVE-2022-0392", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2022-01-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2049175", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to illegal memory access with bracketed paste in Ex mode and leads to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "RHBZ#2049175", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2049175", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0392", url: "https://www.cve.org/CVERecord?id=CVE-2022-0392", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0392", }, ], release_date: "2022-01-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c", }, { cve: "CVE-2022-0413", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2022-01-31T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "2048519", }, ], notes: [ { category: "description", text: "A flaw was found in vim. The vulnerability occurs due to using freed memory when the substitute uses a recursive function call, resulting in a use-after-free vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", title: "Vulnerability description", }, { category: "summary", text: "vim: Use after free in src/ex_cmds.c", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "RHBZ#2048519", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2048519", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2022-0413", url: "https://www.cve.org/CVERecord?id=CVE-2022-0413", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0413", }, ], release_date: "2022-01-30T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2022-03-15T10:25:38+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2022:0894", }, { category: "workaround", details: "Untrusted vim scripts with -s [scriptin] are not recommended to run.", product_ids: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.12.src", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.12.noarch", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.12.x86_64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.aarch64", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.ppc64le", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.s390x", "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.12.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "vim: Use after free in src/ex_cmds.c", }, ], }
var-202201-0499
Vulnerability from variot
Heap-based Buffer Overflow in vim/vim prior to 8.2. Summary:
The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es):
- golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Solution:
For details on how to install and use MTC, refer to:
https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html
- Bugs fixed (https://bugzilla.redhat.com/):
1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
- Description:
Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):
2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files 2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files 2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes Advisory ID: RHSA-2022:1476-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2022:1476 Issue date: 2022-04-20 CVE Names: CVE-2021-0920 CVE-2021-3999 CVE-2021-4154 CVE-2021-23177 CVE-2021-23566 CVE-2021-31566 CVE-2021-41190 CVE-2021-43565 CVE-2021-45960 CVE-2021-46143 CVE-2022-0144 CVE-2022-0155 CVE-2022-0235 CVE-2022-0261 CVE-2022-0318 CVE-2022-0330 CVE-2022-0359 CVE-2022-0361 CVE-2022-0392 CVE-2022-0413 CVE-2022-0435 CVE-2022-0492 CVE-2022-0516 CVE-2022-0536 CVE-2022-0778 CVE-2022-0811 CVE-2022-0847 CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 CVE-2022-22942 CVE-2022-23218 CVE-2022-23219 CVE-2022-23308 CVE-2022-23852 CVE-2022-24450 CVE-2022-24778 CVE-2022-25235 CVE-2022-25236 CVE-2022-25315 CVE-2022-27191 =====================================================================
- Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.4.3 General Availability release images. This update provides security fixes, bug fixes, and updates the container images.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.
- Description:
Red Hat Advanced Cluster Management for Kubernetes 2.4.3 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide some security fixes and bug fixes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/
Security updates:
-
golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
-
nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)
-
nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
-
nodejs-shelljs: improper privilege management (CVE-2022-0144)
-
search-ui-container: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)
-
node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
-
follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
-
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
-
imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path (CVE-2022-24778)
-
golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
-
opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)
Related bugs:
-
RHACM 2.4.3 image files (BZ #2057249)
-
Observability - dashboard name contains
/
would cause error when generating dashboard cm (BZ #2032128) -
ACM application placement fails after renaming the application name (BZ
2033051)
-
Disable the obs metric collect should not impact the managed cluster upgrade (BZ #2039197)
-
Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard (BZ #2039820)
-
The value of name label changed from clusterclaim name to cluster name (BZ #2042223)
-
VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys (BZ
2048500)
-
clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI (BZ #2053211)
-
Application cluster status is not updated in UI after restoring (BZ
2053279)
-
OpenStack cluster creation is using deprecated floating IP config for 4.7+ (BZ #2056610)
-
The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift (BZ #2059039)
-
Subscriptions stop reconciling after channel secrets are recreated (BZ
2059954)
-
Placementrule is not reconciling on a new fresh environment (BZ #2074156)
-
The cluster claimed from clusterpool cannot auto imported (BZ #2074543)
-
Solution:
For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index
For details on how to apply this update, refer to:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing
- Bugs fixed (https://bugzilla.redhat.com/):
2024938 - CVE-2021-41190 opencontainers: OCI manifest and index parsing confusion
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2032128 - Observability - dashboard name contains /
would cause error when generating dashboard cm
2033051 - ACM application placement fails after renaming the application name
2039197 - disable the obs metric collect should not impact the managed cluster upgrade
2039820 - Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard
2042223 - the value of name label changed from clusterclaim name to cluster name
2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
2048500 - VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys
2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function
2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
2053211 - clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI
2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak
2053279 - Application cluster status is not updated in UI after restoring
2056610 - OpenStack cluster creation is using deprecated floating IP config for 4.7+
2057249 - RHACM 2.4.3 images
2059039 - The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift
2059954 - Subscriptions stop reconciling after channel secrets are recreated
2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server
2069368 - CVE-2022-24778 imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path
2074156 - Placementrule is not reconciling on a new fresh environment
2074543 - The cluster claimed from clusterpool can not auto imported
- References:
https://access.redhat.com/security/cve/CVE-2021-0920 https://access.redhat.com/security/cve/CVE-2021-3999 https://access.redhat.com/security/cve/CVE-2021-4154 https://access.redhat.com/security/cve/CVE-2021-23177 https://access.redhat.com/security/cve/CVE-2021-23566 https://access.redhat.com/security/cve/CVE-2021-31566 https://access.redhat.com/security/cve/CVE-2021-41190 https://access.redhat.com/security/cve/CVE-2021-43565 https://access.redhat.com/security/cve/CVE-2021-45960 https://access.redhat.com/security/cve/CVE-2021-46143 https://access.redhat.com/security/cve/CVE-2022-0144 https://access.redhat.com/security/cve/CVE-2022-0155 https://access.redhat.com/security/cve/CVE-2022-0235 https://access.redhat.com/security/cve/CVE-2022-0261 https://access.redhat.com/security/cve/CVE-2022-0318 https://access.redhat.com/security/cve/CVE-2022-0330 https://access.redhat.com/security/cve/CVE-2022-0359 https://access.redhat.com/security/cve/CVE-2022-0361 https://access.redhat.com/security/cve/CVE-2022-0392 https://access.redhat.com/security/cve/CVE-2022-0413 https://access.redhat.com/security/cve/CVE-2022-0435 https://access.redhat.com/security/cve/CVE-2022-0492 https://access.redhat.com/security/cve/CVE-2022-0516 https://access.redhat.com/security/cve/CVE-2022-0536 https://access.redhat.com/security/cve/CVE-2022-0778 https://access.redhat.com/security/cve/CVE-2022-0811 https://access.redhat.com/security/cve/CVE-2022-0847 https://access.redhat.com/security/cve/CVE-2022-22822 https://access.redhat.com/security/cve/CVE-2022-22823 https://access.redhat.com/security/cve/CVE-2022-22824 https://access.redhat.com/security/cve/CVE-2022-22825 https://access.redhat.com/security/cve/CVE-2022-22826 https://access.redhat.com/security/cve/CVE-2022-22827 https://access.redhat.com/security/cve/CVE-2022-22942 https://access.redhat.com/security/cve/CVE-2022-23218 https://access.redhat.com/security/cve/CVE-2022-23219 https://access.redhat.com/security/cve/CVE-2022-23308 https://access.redhat.com/security/cve/CVE-2022-23852 https://access.redhat.com/security/cve/CVE-2022-24450 https://access.redhat.com/security/cve/CVE-2022-24778 https://access.redhat.com/security/cve/CVE-2022-25235 https://access.redhat.com/security/cve/CVE-2022-25236 https://access.redhat.com/security/cve/CVE-2022-25315 https://access.redhat.com/security/cve/CVE-2022-27191 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/
Security updates:
-
nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
-
nodejs-shelljs: improper privilege management (CVE-2022-0144)
-
follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)
-
node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
-
follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
Bug fix:
-
RHACM 2.3.8 images (Bugzilla #2062316)
-
Bugs fixed (https://bugzilla.redhat.com/):
2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor 2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak 2062316 - RHACM 2.3.8 images
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2022-10-24-2 macOS Ventura 13
macOS Ventura 13 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213488.
Accelerate Framework Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory consumption issue was addressed with improved memory handling. CVE-2022-42795: ryuzaki
Apple Neural Engine Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to leak sensitive kernel state Description: The issue was addressed with improved memory handling. CVE-2022-32858: Mohamed Ghannam (@_simo36)
Apple Neural Engine Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32898: Mohamed Ghannam (@_simo36) CVE-2022-32899: Mohamed Ghannam (@_simo36)
AppleAVD Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to cause a denial-of-service Description: A memory corruption issue was addressed with improved state management. CVE-2022-32827: Antonio Zekic (@antoniozekic), Natalie Silvanovich of Google Project Zero, an anonymous researcher
AppleMobileFileIntegrity Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42789: Koh M. Nakagawa of FFRI Security, Inc.
AppleMobileFileIntegrity Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: This issue was addressed by removing additional entitlements. CVE-2022-42825: Mickey Jin (@patch1t)
ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass Privacy preferences Description: A logic issue was addressed with improved state management. CVE-2022-32902: Mickey Jin (@patch1t)
ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An access issue was addressed with additional sandbox restrictions. CVE-2022-32904: Mickey Jin (@patch1t)
ATS Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved checks. CVE-2022-32890: Mickey Jin (@patch1t)
Audio Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2022-42796: an anonymous researcher
AVEVideoEncoder Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved bounds checks. CVE-2022-32940: ABC Research s.r.o.
Calendar Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: An access issue was addressed with improved access restrictions. CVE-2022-42819: an anonymous researcher
CFNetwork Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution Description: A certificate validation issue existed in the handling of WKWebView. This issue was addressed with improved validation. CVE-2022-42813: Jonathan Zhang of Open Computing Facility (ocf.berkeley.edu)
ColorSync Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. CVE-2022-26730: David Hoyt of Hoyt LLC
Crash Reporter Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to an iOS device may be able to read past diagnostic logs Description: This issue was addressed with improved data protection. CVE-2022-32867: Kshitij Kumar and Jai Musunuri of Crowdstrike
curl Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Multiple issues in curl Description: Multiple issues were addressed by updating to curl version 7.84.0. CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208
Directory Utility Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: A logic issue was addressed with improved checks. CVE-2022-42814: Sergii Kryvoblotskyi of MacPaw Inc.
DriverKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32865: Linus Henze of Pinauten GmbH (pinauten.de)
DriverKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A type confusion issue was addressed with improved checks. CVE-2022-32915: Tommy Muir (@Muirey03)
Exchange Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user in a privileged network position may be able to intercept mail credentials Description: A logic issue was addressed with improved restrictions. CVE-2022-32928: an anonymous researcher
Find My Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A malicious application may be able to read sensitive location information Description: A permissions issue existed. This issue was addressed with improved permission validation. CVE-2022-42788: Csaba Fitzl (@theevilbit) of Offensive Security, Wojciech Reguła of SecuRing (wojciechregula.blog)
Finder Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted DMG file may lead to arbitrary code execution with system privileges Description: This issue was addressed with improved validation of symlinks. CVE-2022-32905: Ron Masas (breakpoint.sh) of BreakPoint Technologies LTD
GPU Drivers Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32947: Asahi Lina (@LinaAsahi)
Grapher Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted gcx file may lead to unexpected app termination or arbitrary code execution Description: The issue was addressed with improved memory handling. CVE-2022-42809: Yutao Wang (@Jack) and Yu Zhou (@yuzhou6666)
Image Processing Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed app may be able to determine which app is currently using the camera Description: The issue was addressed with additional restrictions on the observability of app states. CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)
ImageIO Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing an image may lead to a denial-of-service Description: A denial-of-service issue was addressed with improved validation. CVE-2022-1622
Intel Graphics Driver Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to disclose kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2022-32936: Antonio Zekic (@antoniozekic)
IOHIDFamily Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may cause unexpected app termination or arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2022-42820: Peter Pan ZhenPeng of STAR Labs
IOKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42806: Tingting Yin of Tsinghua University
Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de)
Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de) CVE-2022-32911: Zweig of Kunlun Lab CVE-2022-32924: Ian Beer of Google Project Zero
Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-32914: Zweig of Kunlun Lab
Kernel Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause kernel code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-42808: Zweig of Kunlun Lab
Mail Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: This issue was addressed with improved data protection. CVE-2022-42815: Csaba Fitzl (@theevilbit) of Offensive Security
Maps Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved restrictions. CVE-2022-32883: Ron Masas of breakpointhq.com
MediaLibrary Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2022-32908: an anonymous researcher
ncurses Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to cause unexpected app termination or arbitrary code execution Description: A buffer overflow was addressed with improved bounds checking. CVE-2021-39537
ncurses Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing a maliciously crafted file may lead to a denial- of-service or potentially disclose memory contents Description: A denial-of-service issue was addressed with improved validation. CVE-2022-29458
Notes Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user in a privileged network position may be able to track user activity Description: This issue was addressed with improved data protection. CVE-2022-42818: Gustav Hansen from WithSecure
Notifications Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to a device may be able to access contacts from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-32879: Ubeydullah Sümer
PackageKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: A race condition was addressed with improved state handling. CVE-2022-32895: Mickey Jin (@patch1t) of Trend Micro, Mickey Jin (@patch1t)
Photos Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass Privacy preferences Description: This issue was addressed with improved data protection. CVE-2022-32918: an anonymous researcher, Jugal Goradia of Aastha Technologies, Srijan Shivam Mishra of The Hack Report, Evan Ricafort (evanricafort.com) of Invalid Web Security, Amod Raghunath Patwardhan of Pune, India, Ashwani Rajput of Nagarro Software Pvt. Ltd
ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-42829: an anonymous researcher
ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: The issue was addressed with improved memory handling. CVE-2022-42830: an anonymous researcher
ppp Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2022-42831: an anonymous researcher CVE-2022-42832: an anonymous researcher
Ruby Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause unexpected app termination or arbitrary code execution Description: A memory corruption issue was addressed by updating Ruby to version 2.6.10. CVE-2022-28739
Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to modify protected parts of the file system Description: A logic issue was addressed with improved restrictions. CVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security
Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app with root privileges may be able to access private information Description: This issue was addressed with improved data protection. CVE-2022-32862: an anonymous researcher
Sandbox Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to access user-sensitive data Description: An access issue was addressed with additional sandbox restrictions. CVE-2022-42811: Justin Bui (@slyd0g) of Snowflake
Security Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to bypass code signing checks Description: An issue in code signature validation was addressed with improved checks. CVE-2022-42793: Linus Henze of Pinauten GmbH (pinauten.de)
Shortcuts Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A shortcut may be able to check the existence of an arbitrary path on the file system Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2022-32938: Cristian Dinca of Tudor Vianu National High School of Computer Science of. Romania
Sidecar Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user may be able to view restricted content from the lock screen Description: A logic issue was addressed with improved state management. CVE-2022-42790: Om kothawade of Zaprico Digital
Siri Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A user with physical access to a device may be able to use Siri to obtain some call history information Description: A logic issue was addressed with improved state management. CVE-2022-32870: Andrew Goldberg of The McCombs School of Business, The University of Texas at Austin (linkedin.com/in/andrew-goldberg-/)
SMB Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause kernel code execution Description: The issue was addressed with improved memory handling. CVE-2022-32934: Felix Poulin-Belanger
Software Update Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2022-42791: Mickey Jin (@patch1t) of Trend Micro
SQLite Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A remote user may be able to cause a denial-of-service Description: This issue was addressed with improved checks. CVE-2021-36690
Vim Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Multiple issues in Vim Description: Multiple issues were addressed by updating Vim. CVE-2022-0261 CVE-2022-0318 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0392 CVE-2022-0554 CVE-2022-0572 CVE-2022-0629 CVE-2022-0685 CVE-2022-0696 CVE-2022-0714 CVE-2022-0729 CVE-2022-0943 CVE-2022-1381 CVE-2022-1420 CVE-2022-1725 CVE-2022-1616 CVE-2022-1619 CVE-2022-1620 CVE-2022-1621 CVE-2022-1629 CVE-2022-1674 CVE-2022-1733 CVE-2022-1735 CVE-2022-1769 CVE-2022-1927 CVE-2022-1942 CVE-2022-1968 CVE-2022-1851 CVE-2022-1897 CVE-2022-1898 CVE-2022-1720 CVE-2022-2000 CVE-2022-2042 CVE-2022-2124 CVE-2022-2125 CVE-2022-2126
Weather Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: An app may be able to read sensitive location information Description: A logic issue was addressed with improved state management. CVE-2022-32875: an anonymous researcher
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. WebKit Bugzilla: 241969 CVE-2022-32886: P1umer (@p1umer), afang (@afang5472), xmzyshypnc (@xmzyshypnc1)
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. WebKit Bugzilla: 242047 CVE-2022-32888: P1umer (@p1umer)
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. WebKit Bugzilla: 242762 CVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with Trend Micro Zero Day Initiative
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Visiting a malicious website may lead to user interface spoofing Description: The issue was addressed with improved UI handling. WebKit Bugzilla: 243693 CVE-2022-42799: Jihwan Kim (@gPayl0ad), Dohyun Lee (@l33d0hyun)
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. WebKit Bugzilla: 244622 CVE-2022-42823: Dohyun Lee (@l33d0hyun) of SSD Labs
WebKit Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 245058 CVE-2022-42824: Abdulrahman Alqabandi of Microsoft Browser Vulnerability Research, Ryan Shin of IAAI SecLab at Korea University, Dohyun Lee (@l33d0hyun) of DNSLab at Korea University
WebKit PDF Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 242781 CVE-2022-32922: Yonghwi Jin (@jinmo123) at Theori working with Trend Micro Zero Day Initiative
WebKit Sandboxing Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018 and later), iMac (2017 and later), MacBook (2017), and iMac Pro (2017) Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with improvements to the sandbox. WebKit Bugzilla: 243181 CVE-2022-32892: @18楼梦想改造家 and @jq0904 of DBAppSecurity's WeBin lab
Additional recognition
Airport We would like to acknowledge Joseph Salazar Acuña and Renato Llamoca of Intrado-Life & Safety/Globant for their assistance. AppleCredentialManager We would like to acknowledge @jonathandata1 for their assistance.
FaceTime We would like to acknowledge an anonymous researcher for their assistance.
FileVault We would like to acknowledge Timothy Perfitt of Twocanoes Software for their assistance.
Find My We would like to acknowledge an anonymous researcher for their assistance.
Identity Services We would like to acknowledge Joshua Jones for their assistance.
IOAcceleratorFamily We would like to acknowledge Antonio Zekic (@antoniozekic) for their assistance.
Kernel We would like to acknowledge Peter Nguyen of STAR Labs, Tim Michaud (@TimGMichaud) of Moveworks.ai, Tingting Yin of Tsinghua University, and Min Zheng of Ant Group, Tommy Muir (@Muirey03), an anonymous researcher for their assistance.
Mail We would like to acknowledge an anonymous researcher for their assistance.
Mail Drafts We would like to acknowledge an anonymous researcher for their assistance.
Networking We would like to acknowledge Tim Michaud (@TimGMichaud) of Zoom Video Communications for their assistance.
Photo Booth We would like to acknowledge Prashanth Kannan of Dremio for their assistance.
Quick Look We would like to acknowledge Hilary “It’s off by a Pixel” Street for their assistance.
Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance.
smbx We would like to acknowledge HD Moore of runZero Asset Inventory for their assistance.
System We would like to acknowledge Mickey Jin (@patch1t) of Trend Micro for their assistance.
System Settings We would like to acknowledge Bjorn Hellenbrand for their assistance.
UIKit We would like to acknowledge Aleczander Ewing for their assistance.
WebKit We would like to acknowledge Maddie Stone of Google Project Zero, Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt. Ltd., an anonymous researcher for their assistance.
WebRTC We would like to acknowledge an anonymous researcher for their assistance.
macOS Ventura 13 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmNW1wIACgkQ4RjMIDke NxnZ+xAAqoucBvVAByV37Mr4jEpccIOz7wHZ/4vv7+y7dm34CenADqWWkHi9dHD9 Esk5iJaS1vrapc8BdZLfa5EzI5jo9dww+gqs/sqq48bugg86JmDJe77f9EPwjbm0 shX3psa1A3RWfESeNdOUl+MEk/1zip5fstehhqBS54kGMCK1Q4fQmWNmWZHEZyGX W8OFY8nUIceEpL402U+sCc8HscAfcsKkcsMApjrwjVmr/oFdPDfCXgMVYxSh6Xrv F24+7zGPI1sl3SI1fzaP30fZRY7COGkUSQ2zpVQZsiazqt3G6kCQrv99Ut/OAMl+ 0DHPLtV/Tv31s6CyjvCNEIpVpRkPZ6AgYYvQHbuJBmFsV4EP86eZ8kj9XBxfjk4+ kz/cXAgDE8Q7rvT/8uFr/TWS+uP9H4J87FMGuYrQR33lptaiJyP0sy2TTnJ5fTm5 FPH7vbcL4lSo//YK7TNxHMdDzDNSH+dcfFcXPHHSrcW27KuM4Rft8esy+r9r+SZj mJlZa5pVqlo8BjsOnkWd559N2UrFQxB0trwEaAAeQPMPjczc6yR8rxmh01dpZ2CW 0curmxCY81yt/Gm+qCcuAbXG3XQSYYH6Bc+vkxiyFXYnuHNRQCdFTLBG7muc1my6 gitAC7jLftbZMtTQPmbgeyhsBPjqmT7L0O7DzDuHHLQi3O/xc28= =lEWC -----END PGP SIGNATURE——
. CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit) Entry added October 27, 2022
iMovie Available for: macOS Monterey Impact: A user may be able to view sensitive user information Description: This issue was addressed by enabling hardened runtime. Apple is aware of a report that this issue may have been actively exploited
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0499", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "vim", scope: "lt", trust: 1, vendor: "vim", version: "8.2.4151", }, { model: "macos", scope: "lt", trust: 1, vendor: "apple", version: "13.0", }, { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "10.0", }, ], sources: [ { db: "NVD", id: "CVE-2022-0318", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "PACKETSTORM", id: "166789", }, { db: "PACKETSTORM", id: "166431", }, { db: "PACKETSTORM", id: "166433", }, { db: "PACKETSTORM", id: "166812", }, { db: "PACKETSTORM", id: "166516", }, ], trust: 0.5, }, cve: "CVE-2022-0318", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CVE-2022-0318", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 1.1, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-412969", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2022-0318", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "LOCAL", author: "security@huntr.dev", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 1.8, id: "CVE-2022-0318", impactScore: 4.7, integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2022-0318", trust: 1, value: "CRITICAL", }, { author: "security@huntr.dev", id: "CVE-2022-0318", trust: 1, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202201-2134", trust: 0.6, value: "CRITICAL", }, { author: "VULHUB", id: "VHN-412969", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2022-0318", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-412969", }, { db: "VULMON", id: "CVE-2022-0318", }, { db: "CNNVD", id: "CNNVD-202201-2134", }, { db: "NVD", id: "CVE-2022-0318", }, { db: "NVD", id: "CVE-2022-0318", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Heap-based Buffer Overflow in vim/vim prior to 8.2. Summary:\n\nThe Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:\n\nThe Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or\nthe Kubernetes API. \n\nSecurity Fix(es):\n\n* golang: net/http/httputil: panic due to racy read of persistConn after\nhandler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Solution:\n\nFor details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic\n\n5. Description:\n\nRed Hat Openshift GitOps is a declarative way to implement continuous\ndeployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):\n\n2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files\n2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files\n2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes\nAdvisory ID: RHSA-2022:1476-01\nProduct: Red Hat ACM\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:1476\nIssue date: 2022-04-20\nCVE Names: CVE-2021-0920 CVE-2021-3999 CVE-2021-4154 \n CVE-2021-23177 CVE-2021-23566 CVE-2021-31566 \n CVE-2021-41190 CVE-2021-43565 CVE-2021-45960 \n CVE-2021-46143 CVE-2022-0144 CVE-2022-0155 \n CVE-2022-0235 CVE-2022-0261 CVE-2022-0318 \n CVE-2022-0330 CVE-2022-0359 CVE-2022-0361 \n CVE-2022-0392 CVE-2022-0413 CVE-2022-0435 \n CVE-2022-0492 CVE-2022-0516 CVE-2022-0536 \n CVE-2022-0778 CVE-2022-0811 CVE-2022-0847 \n CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 \n CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 \n CVE-2022-22942 CVE-2022-23218 CVE-2022-23219 \n CVE-2022-23308 CVE-2022-23852 CVE-2022-24450 \n CVE-2022-24778 CVE-2022-25235 CVE-2022-25236 \n CVE-2022-25315 CVE-2022-27191 \n=====================================================================\n\n1. Summary:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.4.3 General\nAvailability release images. This update provides security fixes, bug\nfixes, and updates the container images. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE links in the References section. \n\n2. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.4.3 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console—with security policy built in. \n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which provide some security fixes and bug fixes. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/\n\nSecurity updates:\n\n* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)\n\n* nats-server: misusing the \"dynamically provisioned sandbox accounts\"\nfeature authenticated user can obtain the privileges of the System account\n(CVE-2022-24450)\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* nodejs-shelljs: improper privilege management (CVE-2022-0144)\n\n* search-ui-container: follow-redirects: Exposure of Private Personal\nInformation to an Unauthorized Actor (CVE-2022-0155)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor\n(CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization\nHeader leak (CVE-2022-0536)\n\n* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing\ncertificates (CVE-2022-0778)\n\n* imgcrypt: Unauthorized access to encryted container image on a shared\nsystem due to missing check in CheckAuthorization() code path\n(CVE-2022-24778)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* opencontainers: OCI manifest and index parsing confusion (CVE-2021-41190)\n\nRelated bugs:\n\n* RHACM 2.4.3 image files (BZ #2057249)\n\n* Observability - dashboard name contains `/` would cause error when\ngenerating dashboard cm (BZ #2032128)\n\n* ACM application placement fails after renaming the application name (BZ\n#2033051)\n\n* Disable the obs metric collect should not impact the managed cluster\nupgrade (BZ #2039197)\n\n* Observability - cluster list should only contain OCP311 cluster on OCP311\ndashboard (BZ #2039820)\n\n* The value of name label changed from clusterclaim name to cluster name\n(BZ #2042223)\n\n* VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys (BZ\n#2048500)\n\n* clusterSelector matchLabels spec are cleared when changing app\nname/namespace during creating an app in UI (BZ #2053211)\n\n* Application cluster status is not updated in UI after restoring (BZ\n#2053279)\n\n* OpenStack cluster creation is using deprecated floating IP config for\n4.7+ (BZ #2056610)\n\n* The value of Vendor reported by cluster metrics was Other even if the\nvendor label in managedcluster was Openshift (BZ #2059039)\n\n* Subscriptions stop reconciling after channel secrets are recreated (BZ\n#2059954)\n\n* Placementrule is not reconciling on a new fresh environment (BZ #2074156)\n\n* The cluster claimed from clusterpool cannot auto imported (BZ #2074543)\n\n3. Solution:\n\nFor Red Hat Advanced Cluster Management for Kubernetes, see the following\ndocumentation, which will be updated shortly for this release, for\nimportant\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous\nerrata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n2024938 - CVE-2021-41190 opencontainers: OCI manifest and index parsing confusion\n2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic\n2032128 - Observability - dashboard name contains `/` would cause error when generating dashboard cm\n2033051 - ACM application placement fails after renaming the application name\n2039197 - disable the obs metric collect should not impact the managed cluster upgrade\n2039820 - Observability - cluster list should only contain OCP311 cluster on OCP311 dashboard\n2042223 - the value of name label changed from clusterclaim name to cluster name\n2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management\n2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor\n2048500 - VMWare Cluster creation does not accept ecdsa-sha2-nistp521 ssh keys\n2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function\n2052573 - CVE-2022-24450 nats-server: misusing the \"dynamically provisioned sandbox accounts\" feature authenticated user can obtain the privileges of the System account\n2053211 - clusterSelector matchLabels spec are cleared when changing app name/namespace during creating an app in UI\n2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak\n2053279 - Application cluster status is not updated in UI after restoring\n2056610 - OpenStack cluster creation is using deprecated floating IP config for 4.7+\n2057249 - RHACM 2.4.3 images\n2059039 - The value of Vendor reported by cluster metrics was Other even if the vendor label in managedcluster was Openshift\n2059954 - Subscriptions stop reconciling after channel secrets are recreated\n2062202 - CVE-2022-0778 openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates\n2064702 - CVE-2022-27191 golang: crash in a golang.org/x/crypto/ssh server\n2069368 - CVE-2022-24778 imgcrypt: Unauthorized access to encryted container image on a shared system due to missing check in CheckAuthorization() code path\n2074156 - Placementrule is not reconciling on a new fresh environment\n2074543 - The cluster claimed from clusterpool can not auto imported\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-0920\nhttps://access.redhat.com/security/cve/CVE-2021-3999\nhttps://access.redhat.com/security/cve/CVE-2021-4154\nhttps://access.redhat.com/security/cve/CVE-2021-23177\nhttps://access.redhat.com/security/cve/CVE-2021-23566\nhttps://access.redhat.com/security/cve/CVE-2021-31566\nhttps://access.redhat.com/security/cve/CVE-2021-41190\nhttps://access.redhat.com/security/cve/CVE-2021-43565\nhttps://access.redhat.com/security/cve/CVE-2021-45960\nhttps://access.redhat.com/security/cve/CVE-2021-46143\nhttps://access.redhat.com/security/cve/CVE-2022-0144\nhttps://access.redhat.com/security/cve/CVE-2022-0155\nhttps://access.redhat.com/security/cve/CVE-2022-0235\nhttps://access.redhat.com/security/cve/CVE-2022-0261\nhttps://access.redhat.com/security/cve/CVE-2022-0318\nhttps://access.redhat.com/security/cve/CVE-2022-0330\nhttps://access.redhat.com/security/cve/CVE-2022-0359\nhttps://access.redhat.com/security/cve/CVE-2022-0361\nhttps://access.redhat.com/security/cve/CVE-2022-0392\nhttps://access.redhat.com/security/cve/CVE-2022-0413\nhttps://access.redhat.com/security/cve/CVE-2022-0435\nhttps://access.redhat.com/security/cve/CVE-2022-0492\nhttps://access.redhat.com/security/cve/CVE-2022-0516\nhttps://access.redhat.com/security/cve/CVE-2022-0536\nhttps://access.redhat.com/security/cve/CVE-2022-0778\nhttps://access.redhat.com/security/cve/CVE-2022-0811\nhttps://access.redhat.com/security/cve/CVE-2022-0847\nhttps://access.redhat.com/security/cve/CVE-2022-22822\nhttps://access.redhat.com/security/cve/CVE-2022-22823\nhttps://access.redhat.com/security/cve/CVE-2022-22824\nhttps://access.redhat.com/security/cve/CVE-2022-22825\nhttps://access.redhat.com/security/cve/CVE-2022-22826\nhttps://access.redhat.com/security/cve/CVE-2022-22827\nhttps://access.redhat.com/security/cve/CVE-2022-22942\nhttps://access.redhat.com/security/cve/CVE-2022-23218\nhttps://access.redhat.com/security/cve/CVE-2022-23219\nhttps://access.redhat.com/security/cve/CVE-2022-23308\nhttps://access.redhat.com/security/cve/CVE-2022-23852\nhttps://access.redhat.com/security/cve/CVE-2022-24450\nhttps://access.redhat.com/security/cve/CVE-2022-24778\nhttps://access.redhat.com/security/cve/CVE-2022-25235\nhttps://access.redhat.com/security/cve/CVE-2022-25236\nhttps://access.redhat.com/security/cve/CVE-2022-25315\nhttps://access.redhat.com/security/cve/CVE-2022-27191\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing\n\n6. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/\n\nSecurity updates:\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* nodejs-shelljs: improper privilege management (CVE-2022-0144)\n\n* follow-redirects: Exposure of Private Personal Information to an\nUnauthorized Actor (CVE-2022-0155)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor\n(CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization\nHeader leak (CVE-2022-0536)\n\nBug fix:\n\n* RHACM 2.3.8 images (Bugzilla #2062316)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management\n2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor\n2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor\n2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function\n2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak\n2062316 - RHACM 2.3.8 images\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2022-10-24-2 macOS Ventura 13\n\nmacOS Ventura 13 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT213488. \n\nAccelerate Framework\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory consumption issue was addressed with improved\nmemory handling. \nCVE-2022-42795: ryuzaki\n\nApple Neural Engine\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to leak sensitive kernel state\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32858: Mohamed Ghannam (@_simo36)\n\nApple Neural Engine\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32898: Mohamed Ghannam (@_simo36)\nCVE-2022-32899: Mohamed Ghannam (@_simo36)\n\nAppleAVD\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to cause a denial-of-service\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2022-32827: Antonio Zekic (@antoniozekic), Natalie Silvanovich of\nGoogle Project Zero, an anonymous researcher\n\nAppleMobileFileIntegrity\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to access user-sensitive data\nDescription: An issue in code signature validation was addressed with\nimproved checks. \nCVE-2022-42789: Koh M. Nakagawa of FFRI Security, Inc. \n\nAppleMobileFileIntegrity\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to modify protected parts of the file\nsystem\nDescription: This issue was addressed by removing additional\nentitlements. \nCVE-2022-42825: Mickey Jin (@patch1t)\n\nATS\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to bypass Privacy preferences\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-32902: Mickey Jin (@patch1t)\n\nATS\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to access user-sensitive data\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2022-32904: Mickey Jin (@patch1t)\n\nATS\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A logic issue was addressed with improved checks. \nCVE-2022-32890: Mickey Jin (@patch1t)\n\nAudio\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to gain elevated privileges\nDescription: This issue was addressed by removing the vulnerable\ncode. \nCVE-2022-42796: an anonymous researcher\n\nAVEVideoEncoder\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved bounds checks. \nCVE-2022-32940: ABC Research s.r.o. \n\nCalendar\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to read sensitive location information\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2022-42819: an anonymous researcher\n\nCFNetwork\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted certificate may lead to\narbitrary code execution\nDescription: A certificate validation issue existed in the handling\nof WKWebView. This issue was addressed with improved validation. \nCVE-2022-42813: Jonathan Zhang of Open Computing Facility\n(ocf.berkeley.edu)\n\nColorSync\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue existed in the processing of\nICC profiles. This issue was addressed with improved input\nvalidation. \nCVE-2022-26730: David Hoyt of Hoyt LLC\n\nCrash Reporter\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user with physical access to an iOS device may be able to\nread past diagnostic logs\nDescription: This issue was addressed with improved data protection. \nCVE-2022-32867: Kshitij Kumar and Jai Musunuri of Crowdstrike\n\ncurl\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Multiple issues in curl\nDescription: Multiple issues were addressed by updating to curl\nversion 7.84.0. \nCVE-2022-32205\nCVE-2022-32206\nCVE-2022-32207\nCVE-2022-32208\n\nDirectory Utility\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to access user-sensitive data\nDescription: A logic issue was addressed with improved checks. \nCVE-2022-42814: Sergii Kryvoblotskyi of MacPaw Inc. \n\nDriverKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32865: Linus Henze of Pinauten GmbH (pinauten.de)\n\nDriverKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A type confusion issue was addressed with improved\nchecks. \nCVE-2022-32915: Tommy Muir (@Muirey03)\n\nExchange\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user in a privileged network position may be able to\nintercept mail credentials\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2022-32928: an anonymous researcher\n\nFind My\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A malicious application may be able to read sensitive\nlocation information\nDescription: A permissions issue existed. This issue was addressed\nwith improved permission validation. \nCVE-2022-42788: Csaba Fitzl (@theevilbit) of Offensive Security,\nWojciech Reguła of SecuRing (wojciechregula.blog)\n\nFinder\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted DMG file may lead to\narbitrary code execution with system privileges\nDescription: This issue was addressed with improved validation of\nsymlinks. \nCVE-2022-32905: Ron Masas (breakpoint.sh) of BreakPoint Technologies\nLTD\n\nGPU Drivers\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32947: Asahi Lina (@LinaAsahi)\n\nGrapher\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted gcx file may lead to\nunexpected app termination or arbitrary code execution\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42809: Yutao Wang (@Jack) and Yu Zhou (@yuzhou6666)\n\nImage Processing\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A sandboxed app may be able to determine which app is\ncurrently using the camera\nDescription: The issue was addressed with additional restrictions on\nthe observability of app states. \nCVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)\n\nImageIO\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing an image may lead to a denial-of-service\nDescription: A denial-of-service issue was addressed with improved\nvalidation. \nCVE-2022-1622\n\nIntel Graphics Driver\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to disclose kernel memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2022-32936: Antonio Zekic (@antoniozekic)\n\nIOHIDFamily\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may cause unexpected app termination or arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2022-42820: Peter Pan ZhenPeng of STAR Labs\n\nIOKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A race condition was addressed with improved locking. \nCVE-2022-42806: Tingting Yin of Tsinghua University\n\nKernel\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to disclose kernel memory\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de)\n\nKernel\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de)\nCVE-2022-32911: Zweig of Kunlun Lab\nCVE-2022-32924: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-32914: Zweig of Kunlun Lab\n\nKernel\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A remote user may be able to cause kernel code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-42808: Zweig of Kunlun Lab\n\nMail\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to access user-sensitive data\nDescription: This issue was addressed with improved data protection. \nCVE-2022-42815: Csaba Fitzl (@theevilbit) of Offensive Security\n\nMaps\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to read sensitive location information\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2022-32883: Ron Masas of breakpointhq.com\n\nMediaLibrary\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2022-32908: an anonymous researcher\n\nncurses\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user may be able to cause unexpected app termination or\narbitrary code execution\nDescription: A buffer overflow was addressed with improved bounds\nchecking. \nCVE-2021-39537\n\nncurses\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing a maliciously crafted file may lead to a denial-\nof-service or potentially disclose memory contents\nDescription: A denial-of-service issue was addressed with improved\nvalidation. \nCVE-2022-29458\n\nNotes\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user in a privileged network position may be able to track\nuser activity\nDescription: This issue was addressed with improved data protection. \nCVE-2022-42818: Gustav Hansen from WithSecure\n\nNotifications\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user with physical access to a device may be able to access\ncontacts from the lock screen\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-32879: Ubeydullah Sümer\n\nPackageKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to modify protected parts of the file\nsystem\nDescription: A race condition was addressed with improved state\nhandling. \nCVE-2022-32895: Mickey Jin (@patch1t) of Trend Micro, Mickey Jin\n(@patch1t)\n\nPhotos\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to bypass Privacy preferences\nDescription: This issue was addressed with improved data protection. \nCVE-2022-32918: an anonymous researcher, Jugal Goradia of Aastha\nTechnologies, Srijan Shivam Mishra of The Hack Report, Evan Ricafort\n(evanricafort.com) of Invalid Web Security, Amod Raghunath Patwardhan\nof Pune, India, Ashwani Rajput of Nagarro Software Pvt. Ltd\n\nppp\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app with root privileges may be able to execute arbitrary\ncode with kernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-42829: an anonymous researcher\n\nppp\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app with root privileges may be able to execute arbitrary\ncode with kernel privileges\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-42830: an anonymous researcher\n\nppp\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app with root privileges may be able to execute arbitrary\ncode with kernel privileges\nDescription: A race condition was addressed with improved locking. \nCVE-2022-42831: an anonymous researcher\nCVE-2022-42832: an anonymous researcher\n\nRuby\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A remote user may be able to cause unexpected app termination\nor arbitrary code execution\nDescription: A memory corruption issue was addressed by updating Ruby\nto version 2.6.10. \nCVE-2022-28739\n\nSandbox\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to modify protected parts of the file\nsystem\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security\n\nSandbox\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app with root privileges may be able to access private\ninformation\nDescription: This issue was addressed with improved data protection. \nCVE-2022-32862: an anonymous researcher\n\nSandbox\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to access user-sensitive data\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2022-42811: Justin Bui (@slyd0g) of Snowflake\n\nSecurity\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to bypass code signing checks\nDescription: An issue in code signature validation was addressed with\nimproved checks. \nCVE-2022-42793: Linus Henze of Pinauten GmbH (pinauten.de)\n\nShortcuts\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A shortcut may be able to check the existence of an arbitrary\npath on the file system\nDescription: A parsing issue in the handling of directory paths was\naddressed with improved path validation. \nCVE-2022-32938: Cristian Dinca of Tudor Vianu National High School of\nComputer Science of. Romania\n\nSidecar\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user may be able to view restricted content from the lock\nscreen\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-42790: Om kothawade of Zaprico Digital\n\nSiri\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A user with physical access to a device may be able to use\nSiri to obtain some call history information\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-32870: Andrew Goldberg of The McCombs School of Business,\nThe University of Texas at Austin (linkedin.com/in/andrew-goldberg-/)\n\nSMB\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A remote user may be able to cause kernel code execution\nDescription: The issue was addressed with improved memory handling. \nCVE-2022-32934: Felix Poulin-Belanger\n\nSoftware Update\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to execute arbitrary code with kernel\nprivileges\nDescription: A race condition was addressed with improved state\nhandling. \nCVE-2022-42791: Mickey Jin (@patch1t) of Trend Micro\n\nSQLite\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A remote user may be able to cause a denial-of-service\nDescription: This issue was addressed with improved checks. \nCVE-2021-36690\n\nVim\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Multiple issues in Vim\nDescription: Multiple issues were addressed by updating Vim. \nCVE-2022-0261\nCVE-2022-0318\nCVE-2022-0319\nCVE-2022-0351\nCVE-2022-0359\nCVE-2022-0361\nCVE-2022-0368\nCVE-2022-0392\nCVE-2022-0554\nCVE-2022-0572\nCVE-2022-0629\nCVE-2022-0685\nCVE-2022-0696\nCVE-2022-0714\nCVE-2022-0729\nCVE-2022-0943\nCVE-2022-1381\nCVE-2022-1420\nCVE-2022-1725\nCVE-2022-1616\nCVE-2022-1619\nCVE-2022-1620\nCVE-2022-1621\nCVE-2022-1629\nCVE-2022-1674\nCVE-2022-1733\nCVE-2022-1735\nCVE-2022-1769\nCVE-2022-1927\nCVE-2022-1942\nCVE-2022-1968\nCVE-2022-1851\nCVE-2022-1897\nCVE-2022-1898\nCVE-2022-1720\nCVE-2022-2000\nCVE-2022-2042\nCVE-2022-2124\nCVE-2022-2125\nCVE-2022-2126\n\nWeather\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: An app may be able to read sensitive location information\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-32875: an anonymous researcher\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nWebKit Bugzilla: 241969\nCVE-2022-32886: P1umer (@p1umer), afang (@afang5472), xmzyshypnc\n(@xmzyshypnc1)\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nWebKit Bugzilla: 242047\nCVE-2022-32888: P1umer (@p1umer)\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nWebKit Bugzilla: 242762\nCVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with\nTrend Micro Zero Day Initiative\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Visiting a malicious website may lead to user interface\nspoofing\nDescription: The issue was addressed with improved UI handling. \nWebKit Bugzilla: 243693\nCVE-2022-42799: Jihwan Kim (@gPayl0ad), Dohyun Lee (@l33d0hyun)\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A type confusion issue was addressed with improved\nmemory handling. \nWebKit Bugzilla: 244622\nCVE-2022-42823: Dohyun Lee (@l33d0hyun) of SSD Labs\n\nWebKit\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may disclose\nsensitive user information\nDescription: A logic issue was addressed with improved state\nmanagement. \nWebKit Bugzilla: 245058\nCVE-2022-42824: Abdulrahman Alqabandi of Microsoft Browser\nVulnerability Research, Ryan Shin of IAAI SecLab at Korea University,\nDohyun Lee (@l33d0hyun) of DNSLab at Korea University\n\nWebKit PDF\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nWebKit Bugzilla: 242781\nCVE-2022-32922: Yonghwi Jin (@jinmo123) at Theori working with Trend\nMicro Zero Day Initiative\n\nWebKit Sandboxing\nAvailable for: Mac Studio (2022), Mac Pro (2019 and later), MacBook\nAir (2018 and later), MacBook Pro (2017 and later), Mac mini (2018\nand later), iMac (2017 and later), MacBook (2017), and iMac Pro\n(2017)\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with improvements to the\nsandbox. \nWebKit Bugzilla: 243181\nCVE-2022-32892: @18楼梦想改造家 and @jq0904 of DBAppSecurity's WeBin lab\n\nAdditional recognition\n\nAirport\nWe would like to acknowledge Joseph Salazar Acuña and Renato Llamoca\nof Intrado-Life & Safety/Globant for their assistance. \nAppleCredentialManager\nWe would like to acknowledge @jonathandata1 for their assistance. \n\nFaceTime\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nFileVault\nWe would like to acknowledge Timothy Perfitt of Twocanoes Software\nfor their assistance. \n\nFind My\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nIdentity Services\nWe would like to acknowledge Joshua Jones for their assistance. \n\nIOAcceleratorFamily\nWe would like to acknowledge Antonio Zekic (@antoniozekic) for their\nassistance. \n\nKernel\nWe would like to acknowledge Peter Nguyen of STAR Labs, Tim Michaud\n(@TimGMichaud) of Moveworks.ai, Tingting Yin of Tsinghua University,\nand Min Zheng of Ant Group, Tommy Muir (@Muirey03), an anonymous\nresearcher for their assistance. \n\nMail\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nMail Drafts\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nNetworking\nWe would like to acknowledge Tim Michaud (@TimGMichaud) of Zoom Video\nCommunications for their assistance. \n\nPhoto Booth\nWe would like to acknowledge Prashanth Kannan of Dremio for their\nassistance. \n\nQuick Look\nWe would like to acknowledge Hilary “It’s off by a Pixel” Street for\ntheir assistance. \n\nSandbox\nWe would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive\nSecurity for their assistance. \n\nsmbx\nWe would like to acknowledge HD Moore of runZero Asset Inventory for\ntheir assistance. \n\nSystem\nWe would like to acknowledge Mickey Jin (@patch1t) of Trend Micro for\ntheir assistance. \n\nSystem Settings\nWe would like to acknowledge Bjorn Hellenbrand for their assistance. \n\nUIKit\nWe would like to acknowledge Aleczander Ewing for their assistance. \n\nWebKit\nWe would like to acknowledge Maddie Stone of Google Project Zero,\nNarendra Bhati (@imnarendrabhati) of Suma Soft Pvt. Ltd., an\nanonymous researcher for their assistance. \n\nWebRTC\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nmacOS Ventura 13 may be obtained from the Mac App Store or Apple's\nSoftware Downloads web site: https://support.apple.com/downloads/\nAll information is also posted on the Apple Security Updates\nweb site: https://support.apple.com/en-us/HT201222. \n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\n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\ngitAC7jLftbZMtTQPmbgeyhsBPjqmT7L0O7DzDuHHLQi3O/xc28=\n=lEWC\n-----END PGP SIGNATURE——\n\n\n. \nCVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)\nEntry added October 27, 2022\n\niMovie\nAvailable for: macOS Monterey\nImpact: A user may be able to view sensitive user information\nDescription: This issue was addressed by enabling hardened runtime. Apple is aware of a report that this issue may\nhave been actively exploited", sources: [ { db: "NVD", id: "CVE-2022-0318", }, { db: "VULHUB", id: "VHN-412969", }, { db: "VULMON", id: "CVE-2022-0318", }, { db: "PACKETSTORM", id: "166789", }, { db: "PACKETSTORM", id: "166431", }, { db: "PACKETSTORM", id: "166433", }, { db: "PACKETSTORM", id: "166812", }, { db: "PACKETSTORM", id: "166516", }, { db: "PACKETSTORM", id: "169551", }, { db: "PACKETSTORM", id: "169576", }, ], trust: 1.71, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://www.scap.org.cn/vuln/vhn-412969", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-412969", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-0318", trust: 2.5, }, { db: "PACKETSTORM", id: "166433", trust: 0.8, }, { db: "PACKETSTORM", id: "169576", trust: 0.8, }, { db: "PACKETSTORM", id: "166516", trust: 0.8, }, { db: "PACKETSTORM", id: "166976", trust: 0.7, }, { db: "PACKETSTORM", id: "166323", trust: 0.7, }, { db: "PACKETSTORM", id: "166812", trust: 0.7, }, { db: "CS-HELP", id: "SB2022052327", trust: 0.6, }, { db: "CS-HELP", id: "SB2022031527", trust: 0.6, }, { db: "CS-HELP", id: "SB2022040631", trust: 0.6, }, { db: "CS-HELP", id: "SB2022032843", trust: 0.6, }, { db: "CS-HELP", id: "SB2022032446", trust: 0.6, }, { db: "CS-HELP", id: "SB2022062022", trust: 0.6, }, { db: "CS-HELP", id: "SB2022061208", trust: 0.6, }, { db: "CS-HELP", id: "SB2022022220", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.1263", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3002", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.5300", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.0921", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.2516", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2023.0019", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.1677", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.6148", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202201-2134", trust: 0.6, }, { db: "PACKETSTORM", id: "166431", trust: 0.2, }, { db: "PACKETSTORM", id: "169551", trust: 0.2, }, { db: "PACKETSTORM", id: "169561", trust: 0.1, }, { db: "VULHUB", id: "VHN-412969", trust: 0.1, }, { db: "VULMON", id: "CVE-2022-0318", trust: 0.1, }, { db: "PACKETSTORM", id: "166789", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-412969", }, { db: "VULMON", id: "CVE-2022-0318", }, { db: "PACKETSTORM", id: "166789", }, { db: "PACKETSTORM", id: "166431", }, { db: "PACKETSTORM", id: "166433", }, { db: "PACKETSTORM", id: "166812", }, { db: "PACKETSTORM", id: "166516", }, { db: "PACKETSTORM", id: "169551", }, { db: "PACKETSTORM", id: "169576", }, { db: "CNNVD", id: "CNNVD-202201-2134", }, { db: "NVD", id: "CVE-2022-0318", }, ], }, id: "VAR-202201-0499", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-412969", }, ], trust: 0.01, }, last_update_date: "2024-11-29T21:27:51.913000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Vim Buffer error vulnerability fix", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=183799", }, { title: "Debian CVElist Bug Report Logs: vim : CVE-2022-0318", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=0321046a6188a735269eef60b40f3a2c", }, { title: "Red Hat: Moderate: vim security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20220894 - Security Advisory", }, { title: "Red Hat: CVE-2022-0318", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2022-0318", }, { title: "Amazon Linux AMI: ALAS-2022-1567", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1567", }, { title: "Red Hat: Important: Red Hat OpenShift GitOps security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221041 - Security Advisory", }, { title: "Amazon Linux 2: ALAS2-2022-1751", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1751", }, { title: "Red Hat: Important: Red Hat OpenShift GitOps security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221042 - Security Advisory", }, { title: "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.3.8 security and container updates", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221083 - Security Advisory", }, { title: "Red Hat: Moderate: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221476 - Security Advisory", }, { title: "Red Hat: Moderate: Migration Toolkit for Containers (MTC) 1.5.4 security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221396 - Security Advisory", }, { title: "Amazon Linux 2022: ALAS2022-2022-020", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=ALAS2022-2022-020", }, ], sources: [ { db: "VULMON", id: "CVE-2022-0318", }, { db: "CNNVD", id: "CNNVD-202201-2134", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-122", trust: 1.1, }, { problemtype: "CWE-787", trust: 1.1, }, ], sources: [ { db: "VULHUB", id: "VHN-412969", }, { db: "NVD", id: "CVE-2022-0318", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { trust: 1.8, url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { trust: 1.7, url: "https://support.apple.com/kb/ht213444", }, { trust: 1.7, url: "https://support.apple.com/kb/ht213488", }, { trust: 1.7, url: "http://seclists.org/fulldisclosure/2022/oct/28", }, { trust: 1.7, url: "http://seclists.org/fulldisclosure/2022/oct/41", }, { trust: 1.7, url: "http://seclists.org/fulldisclosure/2022/oct/43", }, { trust: 1.7, url: "https://security.gentoo.org/glsa/202208-32", }, { trust: 1.7, url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0318", }, { trust: 1, url: "https://security.netapp.com/advisory/ntap-20241115-0004/", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2022-0318", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0361", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0261", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0359", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0392", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022031527", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166433/red-hat-security-advisory-2022-1041-01.html", }, { trust: 0.6, url: "https://support.apple.com/en-us/ht213488", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166976/red-hat-security-advisory-2022-1734-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166516/red-hat-security-advisory-2022-1083-01.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022032843", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.5300", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3002", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166323/red-hat-security-advisory-2022-0894-01.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022032446", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022022220", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.2516", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.1263", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/169576/apple-security-advisory-2022-10-27-7.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022061208", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022040631", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/vim-buffer-overflow-via-block-insert-37456", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166812/red-hat-security-advisory-2022-1476-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.0019", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022062022", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.6148", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.0921", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.1677", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022052327", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-25315", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-25236", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-25235", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-23308", }, { trust: 0.5, url: "https://bugzilla.redhat.com/):", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-23852", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22822", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22823", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22827", }, { trust: 0.5, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-0392", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-0261", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2021-31566", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22826", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23177", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2021-3999", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-0413", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-23219", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22824", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2021-45960", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-23218", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-22825", }, { trust: 0.5, url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2021-23177", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2021-46143", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2021-31566", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-0361", }, { trust: 0.5, url: "https://access.redhat.com/security/cve/cve-2022-0359", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-45960", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22822", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-46143", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3999", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0413", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0492", }, { trust: 0.3, url: "https://access.redhat.com/security/updates/classification/#moderate", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-4154", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-0920", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0847", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0435", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-22942", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0330", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-0516", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2022-24407", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2021-0920", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22825", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22823", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22824", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25710", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-25710", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-41190", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-25709", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0778", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25709", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1025", }, { trust: 0.2, url: "https://access.redhat.com/articles/11258", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23219", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22826", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-24407", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-24731", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23218", }, { trust: 0.2, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-24730", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0811", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22827", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23308", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0811", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-24730", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-1025", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23852", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0536", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0235", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0330", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0516", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0847", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0155", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-23566", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0155", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0435", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4154", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0144", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23566", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2022-0235", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0536", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0144", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0492", }, { trust: 0.2, url: "https://support.apple.com/en-us/ht201222.", }, { trust: 0.2, url: "https://support.apple.com/downloads/", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-39537", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0319", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0368", }, { trust: 0.2, url: "https://www.apple.com/support/security/pgp/", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0351", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/122.html", }, { trust: 0.1, url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004859", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22925", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-19603", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-20838", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-21684", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-12762", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36085", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-16135", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36084", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-20231", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-20232", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-28153", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3445", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36086", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-4122", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17594", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36087", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22898", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-42574", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-5827", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19603", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-18218", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-14155", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-13435", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-33560", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-16135", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14155", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-17595", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13751", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3426", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-22817", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3572", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-20232", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-20838", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-22925", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44716", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:1396", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-17594", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-22876", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-13750", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-12762", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-3577", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13435", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-36221", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-28153", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18218", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-0532", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22876", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2014-3577", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-22898", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-22816", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3580", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3800", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-21684", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-13751", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-17595", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3200", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-24370", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-20231", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-24370", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-5827", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13750", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3521", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-44717", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:1042", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:1041", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-25236", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-24731", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-25235", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-41190", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0778", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-27191", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:1476", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24778", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2022-24450", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-43565", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-43565", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2022:1083", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-36690", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0685", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0572", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0629", }, { trust: 0.1, url: "https://support.apple.com/ht213488.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0554", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1720", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2042", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1622", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2124", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2000", }, { trust: 0.1, url: "https://support.apple.com/ht213444.", }, ], sources: [ { db: "VULHUB", id: "VHN-412969", }, { db: "VULMON", id: "CVE-2022-0318", }, { db: "PACKETSTORM", id: "166789", }, { db: "PACKETSTORM", id: "166431", }, { db: "PACKETSTORM", id: "166433", }, { db: "PACKETSTORM", id: "166812", }, { db: "PACKETSTORM", id: "166516", }, { db: "PACKETSTORM", id: "169551", }, { db: "PACKETSTORM", id: "169576", }, { db: "CNNVD", id: "CNNVD-202201-2134", }, { db: "NVD", id: "CVE-2022-0318", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-412969", }, { db: "VULMON", id: "CVE-2022-0318", }, { db: "PACKETSTORM", id: "166789", }, { db: "PACKETSTORM", id: "166431", }, { db: "PACKETSTORM", id: "166433", }, { db: "PACKETSTORM", id: "166812", }, { db: "PACKETSTORM", id: "166516", }, { db: "PACKETSTORM", id: "169551", }, { db: "PACKETSTORM", id: "169576", }, { db: "CNNVD", id: "CNNVD-202201-2134", }, { db: "NVD", id: "CVE-2022-0318", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-01-21T00:00:00", db: "VULHUB", id: "VHN-412969", }, { date: "2022-01-21T00:00:00", db: "VULMON", id: "CVE-2022-0318", }, { date: "2022-04-20T15:12:33", db: "PACKETSTORM", id: "166789", }, { date: "2022-03-24T14:34:35", db: "PACKETSTORM", id: "166431", }, { date: "2022-03-24T14:36:50", db: "PACKETSTORM", id: "166433", }, { date: "2022-04-21T15:12:25", db: "PACKETSTORM", id: "166812", }, { date: "2022-03-29T15:53:19", db: "PACKETSTORM", id: "166516", }, { date: "2022-10-31T14:19:00", db: "PACKETSTORM", id: "169551", }, { date: "2022-10-31T14:42:57", db: "PACKETSTORM", id: "169576", }, { date: "2022-01-21T00:00:00", db: "CNNVD", id: "CNNVD-202201-2134", }, { date: "2022-01-21T12:15:10.053000", db: "NVD", id: "CVE-2022-0318", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-11-29T00:00:00", db: "VULHUB", id: "VHN-412969", }, { date: "2022-01-27T00:00:00", db: "VULMON", id: "CVE-2022-0318", }, { date: "2023-01-03T00:00:00", db: "CNNVD", id: "CNNVD-202201-2134", }, { date: "2024-11-21T06:38:22.010000", db: "NVD", id: "CVE-2022-0318", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-202201-2134", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Vim Buffer error vulnerability", sources: [ { db: "CNNVD", id: "CNNVD-202201-2134", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202201-2134", }, ], trust: 0.6, }, }
ghsa-j89m-7g9m-fcmj
Vulnerability from github
Heap-based Buffer Overflow in vim/vim prior to 8.2.
{ affected: [], aliases: [ "CVE-2022-0318", ], database_specific: { cwe_ids: [ "CWE-122", "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2022-01-21T12:15:00Z", severity: "CRITICAL", }, details: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", id: "GHSA-j89m-7g9m-fcmj", modified: "2022-08-22T00:00:51Z", published: "2022-01-22T00:00:46Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2022-0318", }, { type: "WEB", url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { type: "WEB", url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-32", }, { type: "WEB", url: "https://support.apple.com/kb/HT213444", }, { type: "WEB", url: "https://support.apple.com/kb/HT213488", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2022-0318
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", matchCriteriaId: "0F9F96CA-18A7-4C0B-8C3E-4A4DEC087ABA", versionEndExcluding: "8.2.4151", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "71E032AD-F827-4944-9699-BB1E6D4233FC", versionEndExcluding: "13.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", }, { lang: "es", value: "Un Desbordamiento de Búfer en la región Heap de la Memoria en vim/vim versiones anteriores a 8.2", }, ], id: "CVE-2022-0318", lastModified: "2024-11-21T06:38:22.010", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 4.7, source: "security@huntr.dev", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-01-21T12:15:10.053", references: [ { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { source: "security@huntr.dev", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { source: "security@huntr.dev", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213444", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20241115-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213444", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, ], sourceIdentifier: "security@huntr.dev", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "security@huntr.dev", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2022-0318
Vulnerability from gsd
{ GSD: { alias: "CVE-2022-0318", description: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", id: "GSD-2022-0318", references: [ "https://www.suse.com/security/cve/CVE-2022-0318.html", "https://access.redhat.com/errata/RHSA-2022:0894", "https://alas.aws.amazon.com/cve/html/CVE-2022-0318.html", "https://security.archlinux.org/CVE-2022-0318", "https://advisories.mageia.org/CVE-2022-0318.html", "https://linux.oracle.com/cve/CVE-2022-0318.html", "https://ubuntu.com/security/CVE-2022-0318", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2022-0318", ], details: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", id: "GSD-2022-0318", modified: "2023-12-13T01:19:11.758283Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0318", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in vim/vim", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "vim/vim", version: { version_data: [ { version_affected: "<", version_value: "8.2", }, ], }, }, ], }, vendor_name: "vim", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", refsource: "CONFIRM", url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { name: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", refsource: "MISC", url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { name: "GLSA-202208-32", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213444", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213444", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213488", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { name: "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, ], }, source: { advisory: "0d10ba02-b138-4e68-a284-67f781a62d08", discovery: "EXTERNAL", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.2.4151", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "13.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2022-0318", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", }, { name: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", refsource: "CONFIRM", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", }, { name: "GLSA-202208-32", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { name: "https://support.apple.com/kb/HT213488", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213488", }, { name: "https://support.apple.com/kb/HT213444", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213444", }, { name: "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/28", }, { name: "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/41", }, { name: "20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Oct/43", }, { name: "[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2022-11-29T22:12Z", publishedDate: "2022-01-21T12:15Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.